Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-24210

Опубликовано: 05 апр. 2021
Источник: nvd
CVSS3: 6.1
CVSS2: 5.8
EPSS Средний

Описание

There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:kiboit:phastpress:*:*:*:*:*:wordpress:*:*
Версия до 1.111 (исключая)

EPSS

Процентиль: 94%
0.11853
Средний

6.1 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-601
CWE-601

Связанные уязвимости

github
больше 3 лет назад

There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.

EPSS

Процентиль: 94%
0.11853
Средний

6.1 Medium

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-601
CWE-601