CVE-2026-1390
CSRF Vulnerability in Redirect Countdown WordPress Plugin Allows Settings Manipulation
Publication date: 2026-03-21
Last updated on: 2026-03-21
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redirect_countdown | plugin | to 1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Redirect countdown plugin for WordPress has a vulnerability known as Cross-Site Request Forgery (CSRF) in all versions up to and including 1.0. This occurs because the plugin's function `countdown_settings_content()` lacks nonce validation, which is a security measure to verify legitimate requests.
As a result, an attacker who is not authenticated can trick a site administrator into performing an action, such as clicking a malicious link, which then allows the attacker to update the plugin settings. These settings include the countdown timeout, redirect URL, and custom text.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to change important settings of the Redirect countdown plugin without authorization by tricking an administrator into clicking a malicious link.
- The attacker can modify the countdown timeout, potentially disrupting expected behavior.
- The redirect URL can be changed, which might redirect users to malicious or unintended websites.
- Custom text displayed by the plugin can be altered, possibly misleading users or injecting unwanted content.
Overall, this can lead to a loss of control over the plugin's behavior and potentially harm user trust or site integrity.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know