A lack of capability checks and insufficient nonce check on the AJAX action in the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4, made it possible for authenticated users to install arbitrary plugins on vulnerable sites.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8638b36c-6641-491f-b9df-5db3645e4668 | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/05/severe-vulnerabilities-patched-in-simple-301-redirects-by-betterlinks-plugin/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/8638b36c-6641-491f-b9df-5db3645e4668 | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/05/severe-vulnerabilities-patched-in-simple-301-redirects-by-betterlinks-plugin/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/8638b36c-6641-491f-b9df-5db3645e4668 - Exploit, Third Party Advisory | |
References | () https://www.wordfence.com/blog/2021/05/severe-vulnerabilities-patched-in-simple-301-redirects-by-betterlinks-plugin/ - Exploit, Third Party Advisory |
Information
Published : 2021-06-14 14:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24354
Mitre link : CVE-2021-24354
CVE.ORG link : CVE-2021-24354
JSON object : View
Products Affected
wpdeveloper
- simple_301_redirects
CWE
CWE-862
Missing Authorization