Atomic Edge analysis of CVE-2026-7562 (metadata-based): This vulnerability is a Cross-Site Request Forgery (CSRF) in the WP-Redirection plugin for WordPress, affecting all versions up to and including 1.0.3. The plugin provides URL redirection management for WordPress sites. The CVSS score is 4.3 (medium severity), with a vector that requires user interaction. No patched version exists.
The root cause is the absence of nonce validation in the plugin’s admin settings form and the displayWPRedirectionManagementPage() function. In WordPress, nonce fields prevent CSRF by tying requests to the current user session. The CWE-352 classification indicates the function processes POST requests for add, edit, or delete operations on redirection rules without calling check_admin_referer() or wp_verify_nonce(). Atomic Edge analysis infers this from the CVE description and CWE classification; no code diff is available to confirm the specific function name or the exact nonce omission.
Exploitation requires tricking an authenticated WordPress administrator into clicking a malicious link or visiting a crafted page. The attacker constructs a CSRF payload that submits a POST request to the plugin’s admin management page. The likely endpoint is /wp-admin/admin.php?page=wp-redirection (or similar), with POST parameters such as ‘action’ set to ‘add’, ‘edit’, or ‘delete’, and parameters for the redirection rule (e.g., ‘redirect_from’, ‘redirect_to’). The attacker hosts the crafted form on an external site or embeds it in a link that auto-submits the form. Since no nonce validates the request, the administrator’s browser submits the malicious request with their valid session cookies, performing unauthorized operations.
Remediation requires adding nonce verification to the affected function. The plugin must generate a nonce using wp_create_nonce() and include it as a hidden field in the settings form. The displayWPRedirectionManagementPage() function should call check_admin_referer() or wp_verify_nonce() before processing any POST request to add, edit, or delete redirection rules. Without a patched version available, users should disable the plugin until a fix is released or implement a virtual patch.
Impact is limited to unauthorized modification of redirection rules. An attacker can create redirects to malicious sites, modify existing redirects, or delete legitimate rules. This could lead to phishing attacks, where users are redirected to attacker-controlled domains, or broken site functionality. No data theft or privilege escalation is possible, as the vulnerability only allows state changes to the redirection rules table. The CVSS impact is limited to integrity (low), with no confidentiality impact.







