WF-f2862cee-0412-42ba-9a8e-e5722bece775-redirection

Redirection <= 3.6.3 - Cross-Site Request Forgery to Remote Code Execution

highCross-Site Request Forgery (CSRF)
8.8
CVSS Score
8.8
CVSS Score
high
Severity
3.6.4
Patched in
1896d
Time to patch

Description

The Redirection plugin suffers from a critical Cross-Site Request Forgery vulnerability that allows remote attackers to create a file on the target server and execute arbitrary code. The attack requires an administrator visit a malicious website set up by the attacker, but does not require more interaction nor do they have to click on anything on the malicious website in order to trigger the exploit.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
High
Confidentiality
High
Integrity
High
Availability

Technical Details

Affected versions<=3.6.3
PublishedNovember 14, 2018
Last updatedJanuary 22, 2024
Affected pluginredirection

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.