First published: Mon May 02 2022(Updated: )
The All In One WP Security & Firewall WordPress plugin before 4.4.11 does not validate, sanitise and escape the redirect_to parameter before using it to redirect user, either via a Location header, or meta url attribute, when the Rename Login Page is active, which could lead to an Arbitrary Redirect as well as Cross-Site Scripting issue. Exploitation of this issue requires the Login Page URL value to be known, which should be hard to guess, reducing the risk
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tipsandtricks-hq All In One Wp Security \& Firewall | <4.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-25102.
The severity of CVE-2021-25102 is medium (4.7).
The vulnerability CVE-2021-25102 in the All In One WP Security & Firewall plugin allows for an arbitrary redirect.
The All In One WP Security & Firewall plugin versions up to and excluding 4.4.11 are affected by vulnerability CVE-2021-25102.
Yes, upgrading to version 4.4.11 of the All In One WP Security & Firewall plugin fixes vulnerability CVE-2021-25102.