CVE-2020-36699
low-risk
Published 2023-06-07
The Quick Page/Post Redirect Plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the qppr_save_quick_redirect_ajax and qppr_delete_quick_redirect functions in versions up to, and including, 5.1.9. This makes it possible for low-privileged attackers to interact with the plugin settings and to create a redirect link that would forward all traffic to an external malicious website.
Do I need to act?
-
0.08% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Quick Page\/Post Redirect
Affected Vendors
References (8)
Third Party Advisory
https://wpscan.com/vulnerability/10198
Third Party Advisory
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-quick-page-post-re...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/11c4b855-8589-4ad2-b41...
Third Party Advisory
https://wpscan.com/vulnerability/10198
Third Party Advisory
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-quick-page-post-re...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/11c4b855-8589-4ad2-b41...
23
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal