CVE-2021-4338
moderate-risk
Published 2023-06-07
The 404 to 301 plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the open_redirect & save_redirect functions in versions up to, and including, 3.0.7. This makes it possible for authenticated attackers to view, create and edit redirections.
Do I need to act?
-
0.12% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.4/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Third Party Advisory
https://wpscan.com/vulnerability/9f147107-bc5a-4a01-9979-cd9e16061f12
Third Party Advisory
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-404-to-301-redirec...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/05d6b27f-b1e5-4bb8-b7d...
Third Party Advisory
https://wpscan.com/vulnerability/9f147107-bc5a-4a01-9979-cd9e16061f12
Third Party Advisory
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-404-to-301-redirec...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/05d6b27f-b1e5-4bb8-b7d...
30
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal