CVE-2026-1390 PUBLISHED

Redirect countdown <= 1.0 - Cross-Site Request Forgery to Settings Update

Assigner: Wordfence
Reserved: 23.01.2026 Published: 21.03.2026 Updated: 21.03.2026

The Redirect countdown plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the countdown_settings_content() function. This makes it possible for unauthenticated attackers to update the plugin settings including the countdown timeout, redirect URL, and custom text, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS Score: 4.3

Product Status

Vendor haghs
Product Redirect countdown
Versions Default: unaffected
  • affected from * to 1.0 (incl.)

Credits

  • Muhammad Nur Ibnu Hubab finder

References

Problem Types

  • CWE-352 Cross-Site Request Forgery (CSRF) CWE