Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14451: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in solutionsbysteve Solutions Ad Manager

0
Medium
VulnerabilityCVE-2025-14451cvecve-2025-14451cwe-601
Published: Sat Dec 13 2025 (12/13/2025, 04:31:26 UTC)
Source: CVE Database V5
Vendor/Project: solutionsbysteve
Product: Solutions Ad Manager

Description

The Solutions Ad Manager plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.0.0. This is due to insufficient validation on the redirect URL supplied via the 'sam-redirect-to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:17:55 UTC

Technical Analysis

CVE-2025-14451 identifies an open redirect vulnerability (CWE-601) in the Solutions Ad Manager plugin for WordPress, affecting all versions up to and including 1.0.0. The vulnerability stems from inadequate validation of the 'sam-redirect-to' URL parameter, which is used to redirect users after certain actions within the plugin. Because the plugin does not properly verify that the redirect URL is safe or internal, an attacker can craft a URL that redirects users to arbitrary external websites. This flaw can be exploited by unauthenticated attackers who trick users into clicking malicious links, leading to phishing or malware distribution sites. The vulnerability has a CVSS 3.1 base score of 4.7, reflecting a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary. The scope is changed because the redirection can lead users outside the trusted domain, potentially impacting the integrity of user sessions or trust relationships. Although no exploits are currently known in the wild, the vulnerability poses a risk to users of affected WordPress sites employing this plugin. The lack of patches at the time of disclosure means that users must implement interim mitigations. This vulnerability does not directly compromise confidentiality or availability but can facilitate social engineering and phishing attacks by abusing trusted domains to redirect users to malicious sites.

Potential Impact

The primary impact of this vulnerability is on user trust and integrity rather than direct system compromise. Attackers can exploit the open redirect to conduct phishing campaigns by sending users links that appear to originate from a legitimate WordPress site using the Solutions Ad Manager plugin but redirect them to malicious websites. This can lead to credential theft, malware infection, or other social engineering outcomes. Organizations relying on this plugin risk reputational damage and potential user data compromise indirectly through these attacks. Since the vulnerability requires user interaction but no authentication, the attack surface is broad, affecting any visitor to vulnerable sites. The medium CVSS score reflects that while the vulnerability does not allow direct system takeover, it facilitates attacks that can have significant downstream consequences. The lack of known exploits in the wild currently limits immediate risk, but the widespread use of WordPress and advertising plugins means the potential impact is substantial if exploited at scale.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their use of the Solutions Ad Manager plugin and restrict or monitor the use of the 'sam-redirect-to' parameter. Implement strict validation and sanitization of redirect URLs to ensure they only point to trusted internal domains. If possible, disable or remove the plugin until a vendor patch is released. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect attempts involving this parameter. Educate users and administrators about the risks of clicking untrusted links, especially those appearing to originate from trusted sites. Monitor logs for unusual redirect patterns or spikes in user complaints related to phishing. Once a patch becomes available from the vendor, prioritize its deployment. Additionally, consider implementing Content Security Policy (CSP) headers to restrict navigation to trusted domains and reduce the impact of open redirects.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T14:27:37.343Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef65d977419e584a5099

Added to database: 12/13/2025, 4:45:25 AM

Last enriched: 2/27/2026, 11:17:55 AM

Last updated: 3/24/2026, 12:29:01 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses