6.1
CVE-2025-1488
- EPSS 0.05%
- Veröffentlicht 24.02.2025 11:15:10
- Zuletzt bearbeitet 27.03.2025 00:25:37
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WPO365 | MICROSOFT 365 GRAPH MAILER <= 3.2 - Open Redirect via 'redirect_to' Parameter
The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.
Mögliche Gegenmaßnahme
WPO365 | MICROSOFT 365 GRAPH MAILER: Update to version 3.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WPO365 | MICROSOFT 365 GRAPH MAILER
Version
* - 3.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpo365 ≫ Microsoft 365 Graph Mailer Version <= 3.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.168 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
| security@wordfence.com | 4.7 | 1.6 | 2.7 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
|
CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.