Report
The TPG Redirect plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.7. This is due to missing or incorrect nonce validation on the tpg_rd_show_settings() function. This makes it possible for unauthenticated attackers to invoke this function and modify the plugin's settings and arbitrary options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Score:5.4
Severity:Medium
Version: 1.0.7
There is a patch available in v1.0.8 and we strongly recommend you update to this version as soon as possible.