Key Information Vulnerability Name: WordPress Plugin Quick Page/Post Redirect Security Bypass (5.1.9) Severity: HIGH Classification: - CWE-264 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Tags: - Missing Update - Authentication Bypass Vulnerability Description: - The WordPress Plugin Quick Page/Post Redirect contains a security bypass vulnerability. Exploiting this vulnerability may allow attackers to perform restricted operations and modify plugin settings. WordPress Plugin Quick Page/Post Redirect version 5.1.9 is affected, and earlier versions may also be vulnerable. Remediation Recommendation: - Disable the plugin until a patched version is available. References: - https://blog.nintechnet.com/authenticated-settings-change-vulnerability-in-wordpress-quick-page-post-redirect-plugin-unpatched/ - https://wordpress.org/plugins/quick-pagepost-redirect-plugin/#description Related Vulnerabilities: - Magento Server-Side Request Forgery (SSRF) Vulnerability (CVE-2019-7911) - Drupal Core Security Bypass (8.0.0 - 9.1.15) - Jenkins Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Vulnerability (CVE-2012-4439) - Internet Information Services Other Vulnerability (CVE-1999-1233) - WordPress 4.0.x Multiple Vulnerabilities (4.0 - 4.0.36)