The Quick Page/Post Redirect Plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the qppr_save_quick_redirect_ajax and qppr_delete_quick_redirect functions in versions up to, and including, 5.1.9. This makes it possible for low-privileged attackers to interact with the plugin settings and to create a redirect link that would forward all traffic to an external malicious website.
History

Sat, 21 Dec 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-06-07T01:51:12.687Z

Updated: 2024-12-20T23:56:45.573Z

Reserved: 2023-06-06T12:28:36.858Z

Link: CVE-2020-36699

cve-icon Vulnrichment

Updated: 2024-08-04T17:37:05.275Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T02:15:11.060

Modified: 2024-11-21T05:30:06.003

Link: CVE-2020-36699

cve-icon Redhat

No data.