Description


There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.

Related CPE's


Weaknesses



CWE-601


CWE-601

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.1 · Medium

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-04-05T17:15:17.467Z

4 years ago

Last modified

2024-11-21T04:52:36.067Z

1 year ago