Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24141 | The Quick Page/Post Redirect Plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the qppr_save_quick_redirect_ajax and qppr_delete_quick_redirect functions in versions up to, and including, 5.1.9. This makes it possible for low-privileged attackers to interact with the plugin settings and to create a redirect link that would forward all traffic to an external malicious website. |
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Quick Page/Post Redirect Plugin <= 5.1.9 - Redirect Security Bypass | |
| Weaknesses | CWE-284 |
Sat, 21 Dec 2024 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:36:17.006Z
Reserved: 2023-06-06T12:28:36.858Z
Link: CVE-2020-36699
Updated: 2024-08-04T17:37:05.275Z
Status : Modified
Published: 2023-06-07T02:15:11.060
Modified: 2026-04-08T17:16:35.557
Link: CVE-2020-36699
No data.
OpenCVE Enrichment
No data.
EUVD