The Quick Page/Post Redirect Plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the qppr_save_quick_redirect_ajax and qppr_delete_quick_redirect functions in versions up to, and including, 5.1.9. This makes it possible for low-privileged attackers to interact with the plugin settings and to create a redirect link that would forward all traffic to an external malicious website.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24141 The Quick Page/Post Redirect Plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the qppr_save_quick_redirect_ajax and qppr_delete_quick_redirect functions in versions up to, and including, 5.1.9. This makes it possible for low-privileged attackers to interact with the plugin settings and to create a redirect link that would forward all traffic to an external malicious website.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 21 Dec 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-12-20T23:56:45.573Z

Reserved: 2023-06-06T12:28:36.858Z

Link: CVE-2020-36699

cve-icon Vulnrichment

Updated: 2024-08-04T17:37:05.275Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T02:15:11.060

Modified: 2024-11-21T05:30:06.003

Link: CVE-2020-36699

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses