WF-f2862cee-0412-42ba-9a8e-e5722bece775-redirection
Redirection <= 3.6.3 - Cross-Site Request Forgery to Remote Code Execution
highCross-Site Request Forgery (CSRF)
8.8
CVSS Score
8.8
CVSS Score
high
Severity
3.6.4
Patched in
1896d
Time to patch
Description
The Redirection plugin suffers from a critical Cross-Site Request Forgery vulnerability that allows remote attackers to create a file on the target server and execute arbitrary code. The attack requires an administrator visit a malicious website set up by the attacker, but does not require more interaction nor do they have to click on anything on the malicious website in order to trigger the exploit.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
High
Confidentiality
High
Integrity
High
Availability
Technical Details
Affected versions
<=3.6.3PublishedNovember 14, 2018
Last updatedJanuary 22, 2024
Affected pluginredirection
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.