{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2021-4338","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2023-06-06T12:21:05.847Z","datePublished":"2023-06-07T01:51:11.349Z","dateUpdated":"2026-04-08T16:33:30.671Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T16:33:30.671Z"},"affected":[{"vendor":"joelcj91","product":"404 to 301 – Redirect, Log and Notify 404 Errors","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.0.7","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The 404 to 301 plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the open_redirect & save_redirect functions in versions up to, and including, 3.0.7. This makes it possible for authenticated attackers to view, create and edit redirections."}],"title":"404 to 301 <= 3.0.7 - Missing Authorization to Redirect Creation","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/05d6b27f-b1e5-4bb8-b7db-f8295a5e0d5b?source=cve"},{"url":"https://plugins.trac.wordpress.org/changeset/2546695/404-to-301"},{"url":"https://blog.nintechnet.com/broken-access-control-vulnerability-fixed-in-wordpress-404-to-301-plugin/"},{"url":"https://wpscan.com/vulnerability/9f147107-bc5a-4a01-9979-cd9e16061f12"},{"url":"https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-404-to-301-redirect-log-and-notify-404-errors-security-bypass-3-0-7/"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-284 Improper Access Control","cweId":"CWE-284","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N","baseScore":6.4,"baseSeverity":"MEDIUM"}}],"credits":[{"lang":"en","type":"finder","value":"Jerome Bruandet"}],"timeline":[{"time":"2021-06-18T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:23:10.745Z"},"title":"CVE Program Container","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/05d6b27f-b1e5-4bb8-b7db-f8295a5e0d5b?source=cve","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/changeset/2546695/404-to-301","tags":["x_transferred"]},{"url":"https://blog.nintechnet.com/broken-access-control-vulnerability-fixed-in-wordpress-404-to-301-plugin/","tags":["x_transferred"]},{"url":"https://wpscan.com/vulnerability/9f147107-bc5a-4a01-9979-cd9e16061f12","tags":["x_transferred"]},{"url":"https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-404-to-301-redirect-log-and-notify-404-errors-security-bypass-3-0-7/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-20T23:29:22.469125Z","id":"CVE-2021-4338","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-20T23:56:56.013Z"}}]}}