Description
WordPress Plugin Peter's Login Redirect is prone to multiple vulnerabilities, including cross-site scripting and cross-site request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, or to perform certain administrative actions and gain unauthorized access to the affected application. WordPress Plugin Peter's Login Redirect version 2.9.0 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.9.2 or latest
References
https://packetstormsecurity.com/files/138350/WordPress-Peters-Login-Redirect-2.9.0-XSS-CSRF.html
https://wordpress.org/plugins/peters-login-redirect/changelog/
Related Vulnerabilities
WordPress Plugin Email Subscribers & Newsletters Cross-Site Scripting (4.1.6)
Dolibarr Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-9840)
GlassFish Improper Input Validation Vulnerability (CVE-2011-5035)
Joomla! Core 3.x.x Security Bypass (3.2.0 - 3.4.4)
WordPress Plugin WP TFeed includes Backdoor [Only if downloaded via the vendor website] (1.6.7)