The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 24 Feb 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured. | |
Title | WPO365 | MICROSOFT 365 GRAPH MAILER <= 3.2 - Open Redirect via 'redirect_to' Parameter | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-02-24T11:10:08.896Z
Updated: 2025-02-24T12:47:14.566Z
Reserved: 2025-02-19T21:57:31.462Z
Link: CVE-2025-1488

Updated: 2025-02-24T12:47:04.696Z

Status : Received
Published: 2025-02-24T11:15:10.193
Modified: 2025-02-24T11:15:10.193
Link: CVE-2025-1488

No data.