Affiliate Links, Link Branding, Link Tracking & Marketing Plugin Vulnerability – Cross-Site Request Forgery to Plugin Settings Update – CVE-2024-2326 |WordPress Plugin Vulnerability Report – Pretty Links

Plugin Name: Pretty Links – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin

Key Information:

  • Software Type: Plugin
  • Software Slug: pretty-link
  • Software Status: Active
  • Software Author: supercleanse
  • Software Downloads: 7,316,398
  • Active Installs: 300,000
  • Last Updated: March 22, 2024
  • Patched Versions: 3.6.4
  • Affected Versions: <= 3.6.3

Vulnerability Details:

  • Name: Pretty Links <= 3.6.3
  • Title: Cross-Site Request Forgery (CSRF) to Plugin Settings Update
  • Type: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
  • CVE: CVE-2024-2326
  • CVSS Score: 4.3
  • Publicly Published: March 22, 2024
  • Researcher: Webbernaut
  • Description: The Pretty Links plugin, a popular tool for managing affiliate links and tracking within WordPress, has been identified as vulnerable to Cross-Site Request Forgery (CSRF) in versions up to and including 3.6.3. The vulnerability arises from insufficient nonce validation in the plugin's settings update mechanism, potentially allowing unauthenticated attackers to alter the plugin's configuration through forged requests, provided they can deceive an administrator into interacting with a malicious link.


The Pretty Links plugin for WordPress, widely utilized for its affiliate link management and tracking capabilities, harbors a CSRF vulnerability in versions up to 3.6.3. This flaw enables attackers to manipulate the plugin's settings, including sensitive integrations like Stripe, by exploiting inadequate nonce validation. This issue has been addressed in the subsequent release, version 3.6.4.

Detailed Overview:

This vulnerability was unearthed by security researcher Webbernaut, spotlighting the risks associated with CSRF attacks. Such attacks exploit the trust a site has in the user's browser, allowing attackers to execute unwanted actions on a web application in which a user is authenticated. For Pretty Links, this could mean unauthorized changes to plugin settings, posing a risk to the site's functionality and security. The prompt release of version 3.6.4 by the plugin developers mitigates this risk by implementing proper nonce validation procedures.

Advice for Users:

  • Immediate Action: Users of Pretty Links should upgrade to version 3.6.4 without delay to protect their sites from potential CSRF exploits.
  • Check for Signs of Vulnerability: Admins should review their plugin settings for any unauthorized changes, especially if they suspect that their site might have been compromised.
  • Alternate Plugins: While the patched version is secure, users may consider evaluating other link management plugins as a precautionary measure.
  • Stay Updated: It is imperative to regularly update all WordPress plugins to their latest versions to fend off known vulnerabilities and bolster site security.


The swift rectification of the CSRF vulnerability in Pretty Links by the plugin's developers exemplifies the critical role of timely updates in maintaining the security of WordPress sites. By ensuring that Pretty Links – or any other plugin – is kept up to date, users can fortify their websites against potential threats and maintain a secure online presence.


Detailed Report:

In the bustling world of digital marketing and content creation, WordPress plugins significantly enhance website functionality, making complex tasks simpler and more efficient. Among these invaluable tools, Pretty Links – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin, developed by supercleanse, stands out for its ability to manage affiliate links with ease. However, the recent discovery of a vulnerability, CVE-2024-2326, within this widely utilized plugin serves as a critical reminder of the ever-present need for vigilance in maintaining website security.

Plugin Overview:

Pretty Links is a renowned WordPress plugin, boasting over 7 million downloads and actively installed on 300,000 websites. It allows users to shorten, brand, track, and manage links, making it an indispensable tool for affiliate marketers and content creators. The plugin's last update was on March 22, 2024, bringing it to version 3.6.4.

Vulnerability Details:

The vulnerability, identified as CVE-2024-2326, affects all Pretty Links plugin versions up to and including 3.6.3. It is classified as a Cross-Site Request Forgery (CSRF) vulnerability, where inadequate nonce validation in the plugin's settings update mechanism could allow attackers to manipulate the plugin's configurations through forged requests. The risk is amplified if attackers can deceive an administrator into clicking a malicious link, potentially altering sensitive settings like Stripe integration.

Risks and Impacts:

This vulnerability poses a considerable risk to website integrity and user trust. Exploitation could lead to unauthorized changes in plugin settings, compromising link tracking and branding functionalities. For businesses relying on affiliate marketing, such disruptions could translate to financial losses and damaged reputations.

Remediation Steps:

To mitigate this risk, users are urged to update the Pretty Links plugin to version 3.6.4, which addresses this security flaw. Additionally, website administrators should remain cautious of phishing attempts and educate themselves on the signs of CSRF exploits to prevent future incidents.

Historical Context:

This isn't the first time vulnerabilities have been discovered in Pretty Links; there have been five reported vulnerabilities since December 4, 2011. Each incident reinforces the critical importance of ongoing vigilance and timely updates to ensure security.


The swift response from Pretty Links' developers in addressing CVE-2024-2326 highlights the proactive approach required to maintain digital security. For small business owners managing WordPress websites, this incident underscores the non-negotiable need to stay abreast of plugin updates and security advisories. In a digital landscape where threats continuously evolve, ensuring the security of your online platforms is paramount—not just for safeguarding your business but for preserving the trust and confidence of your users.

For small business owners juggling numerous responsibilities, automating plugin updates where possible, and scheduling regular check-ins on website security can streamline the process, ensuring your digital presence remains secure without overwhelming your workload.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Affiliate Links, Link Branding, Link Tracking & Marketing Plugin Vulnerability – Cross-Site Request Forgery to Plugin Settings Update – CVE-2024-2326 |WordPress Plugin Vulnerability Report – Pretty Links FAQs

What is CVE-2024-2326?

CVE-2024-2326 identifies a specific vulnerability found in the Pretty Links WordPress plugin, versions up to and including 3.6.3. This vulnerability is a type of Cross-Site Request Forgery (CSRF), which could potentially allow unauthorized individuals to alter the plugin's settings through forged requests. Such vulnerabilities exploit the web's trust mechanism to perform actions without the user's consent.

Leave a Comment