### [CVE-2014-2598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2598) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Cross-site request forgery (CSRF) vulnerability in the Quick Page/Post Redirect plugin before 5.0.5 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the quickppr_redirects[request][] parameter in the redirect-updates page to wp-admin/admin.php. ### POC #### Reference - http://packetstormsecurity.com/files/126127 - http://seclists.org/fulldisclosure/2014/Apr/171 - http://www.exploit-db.com/exploits/32867 - https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/ #### Github No PoCs found on GitHub currently.