Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11167: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in creativemindssolutions CM Registration – Tailored tool for seamless login and invitation-based registrations

0
Medium
VulnerabilityCVE-2025-11167cvecve-2025-11167cwe-601
Published: Sat Oct 11 2025 (10/11/2025, 08:29:17 UTC)
Source: CVE Database V5
Vendor/Project: creativemindssolutions
Product: CM Registration – Tailored tool for seamless login and invitation-based registrations

Description

The CM Registration – Tailored tool for seamless login and invitation-based registrations plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 2.5.6. This is due to insufficient validation on the redirect url supplied via the 'redirect_url' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.

AI-Powered Analysis

AILast updated: 10/11/2025, 08:57:08 UTC

Technical Analysis

CVE-2025-11167 identifies an open redirect vulnerability in the CM Registration – Tailored tool for seamless login and invitation-based registrations WordPress plugin, affecting all versions up to and including 2.5.6. The root cause is insufficient validation of the 'redirect_url' parameter, which attackers can manipulate to redirect users to arbitrary, potentially malicious external websites. This vulnerability does not require authentication but does require user interaction, such as clicking on a maliciously crafted URL. The vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site). The CVSS v3.1 base score is 4.7 (medium), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change due to the redirect affecting user sessions. While the vulnerability does not directly compromise confidentiality or availability, it can facilitate phishing, credential theft, or malware delivery by redirecting users to attacker-controlled sites. No public exploits have been reported to date, but the risk remains significant due to the widespread use of WordPress and this plugin for user registration workflows. The vulnerability is particularly concerning in environments where users trust the domain and may not suspect redirection to malicious sites. The lack of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for mitigation steps.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Attackers can exploit the open redirect to lure users into malicious sites that may harvest credentials, distribute malware, or conduct further attacks. Organizations that rely on the CM Registration plugin for user onboarding or invitation-based workflows could see reputational damage if users are compromised via these redirects. The vulnerability does not directly impact data confidentiality or system integrity but can be a stepping stone for more severe attacks. Given the extensive use of WordPress across Europe, especially in small to medium enterprises and public sector websites, the potential attack surface is significant. The impact is heightened in sectors with sensitive user data or critical services, such as finance, healthcare, and government. Additionally, phishing attacks leveraging this vulnerability could undermine trust in digital services and complicate compliance with GDPR requirements related to user data protection and incident response.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit all instances of the CM Registration plugin and identify versions up to 2.5.6 in use. 2) Apply any available patches or updates from the vendor as soon as they are released; if no patch is available, consider disabling or replacing the plugin temporarily. 3) Implement strict server-side validation of the 'redirect_url' parameter to allow only whitelisted internal URLs or domains under organizational control. 4) Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns or parameters. 5) Educate users and administrators about the risks of clicking on unexpected links, especially those involving login or registration workflows. 6) Monitor web traffic and logs for unusual redirect attempts or spikes in user complaints related to phishing. 7) Consider multi-factor authentication (MFA) for user logins to reduce the impact of credential theft resulting from phishing. 8) Review and enhance incident response plans to quickly address phishing campaigns leveraging this vulnerability. 9) Engage with the plugin vendor and WordPress security communities to track patch releases and threat intelligence updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-29T16:52:35.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea182c5baaa01f1c9bed29

Added to database: 10/11/2025, 8:41:16 AM

Last enriched: 10/11/2025, 8:57:08 AM

Last updated: 10/15/2025, 11:16:46 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats