Description

The Redirect countdown plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the `countdown_settings_content()` function. This makes it possible for unauthenticated attackers to update the plugin settings including the countdown timeout, redirect URL, and custom text, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

INFO

Published Date :

2026-03-21T03:26:37.006Z

Last Modified :

2026-04-08T16:41:22.806Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2026-1390 vulnerability.

Vendors Products
Haghs
  • Redirect Countdown
Wordpress
  • Wordpress

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact