Description
WordPress Plugin Peter's Login Redirect is prone to multiple vulnerabilities, including cross-site scripting and cross-site request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, or to perform certain administrative actions and gain unauthorized access to the affected application. WordPress Plugin Peter's Login Redirect version 2.9.0 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.9.2 or latest
References
https://packetstormsecurity.com/files/138350/WordPress-Peters-Login-Redirect-2.9.0-XSS-CSRF.html
https://wordpress.org/plugins/peters-login-redirect/changelog/
Related Vulnerabilities
Magento CVE-2019-7928 Vulnerability (CVE-2019-7928)
WordPress Plugin AStickyPostOrderER Cross-Site Scripting (0.3.1)
WordPress Plugin White Label CMS Cross-Site Request Forgery (1.5)
OpenSSL Use of Insufficiently Random Values Vulnerability (CVE-2019-1549)
WordPress Plugin Broken Link Checker PHAR Deserialization (1.11.16)