Vulnerability Details CVE-2020-36699
The Quick Page/Post Redirect Plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the qppr_save_quick_redirect_ajax and qppr_delete_quick_redirect functions in versions up to, and including, 5.1.9. This makes it possible for low-privileged attackers to interact with the plugin settings and to create a redirect link that would forward all traffic to an external malicious website.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 21.0%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2020-36699
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.0
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.2
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.3
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.4
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.5
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.6
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.6.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.7
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.8
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:1.9
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:2.0
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:2.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:3.0
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:3.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:3.2
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:3.2.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:3.2.2
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:3.2.3
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:4.0
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:4.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:4.2
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:4.2.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:4.2.2
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0.2
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0.3
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0.4
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0.5
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0.6
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.0.7
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.0
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.1
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.2
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.3
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.4
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.5
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.6
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.7
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.8
-
cpe:2.3:a:quick_page/post_redirect_project:quick_page/post_redirect:5.1.9