Description
Cross-site request forgery (CSRF) vulnerability in the Quick Page/Post Redirect plugin before 5.0.5 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the quickppr_redirects[request][] parameter in the redirect-updates page to wp-admin/admin.php.
Exploits (1)
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/105708
Exploit x_refsource_misc
https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/105707
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2014/Apr/171
Exploit x_refsource_misc
http://packetstormsecurity.com/files/126127
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/32867
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/57883
Patch, Vendor Advisory x_refsource_confirm
https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/92528
Scores
EPSS
0.0098
EPSS Percentile
76.8%
Details
CWE
CWE-352
Status
published
Products (1)
quick_page\/post_redirect_project/quick_page\/post_redirect
< 5.0.4
Published
Jan 05, 2015
Tracked Since
Feb 18, 2026