Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1488: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in wpo365 WPO365 | MICROSOFT 365 GRAPH MAILER

0
Medium
VulnerabilityCVE-2025-1488cvecve-2025-1488cwe-601
Published: Mon Feb 24 2025 (02/24/2025, 11:10:08 UTC)
Source: CVE Database V5
Vendor/Project: wpo365
Product: WPO365 | MICROSOFT 365 GRAPH MAILER

Description

The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.

AI-Powered Analysis

AILast updated: 02/25/2026, 21:59:17 UTC

Technical Analysis

CVE-2025-1488 identifies an Open Redirect vulnerability (CWE-601) in the WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress, present in all versions up to and including 3.2. The vulnerability stems from inadequate validation of the 'redirect_to' URL parameter, which is used to redirect users after certain actions. Because the plugin does not properly verify that the redirect URL is safe or belongs to a trusted domain, attackers can craft malicious URLs that appear legitimate but redirect victims to attacker-controlled or malicious websites. Exploitation does not require authentication but does require user interaction, such as clicking a crafted link. The plugin must be activated but not configured for the vulnerability to be exploitable, indicating that default or incomplete setups are at risk. The CVSS 3.1 base score is 4.7, reflecting a medium severity with network attack vector, high attack complexity, no privileges required, user interaction needed, and partial impact on confidentiality and integrity but no impact on availability. Although no known exploits are currently reported in the wild, the vulnerability could facilitate phishing, credential theft, or malware distribution by leveraging trusted domains to bypass user suspicion. The vulnerability affects WordPress sites using this plugin, which integrates Microsoft 365 Graph API for mailer functionality, making it relevant for organizations relying on Microsoft 365 services within WordPress environments. No official patches or updates are listed, so mitigation relies on configuration and input validation controls.

Potential Impact

The primary impact of this vulnerability is the potential for phishing and social engineering attacks. Attackers can exploit the open redirect to send users to malicious websites that may harvest credentials, distribute malware, or conduct further attacks under the guise of a trusted domain. This undermines user trust and can lead to data compromise or account takeover if users are deceived. Since the vulnerability requires user interaction and the plugin to be active but unconfigured, the scope is limited to sites with this specific setup. However, given the widespread use of WordPress and Microsoft 365 integrations, many organizations worldwide could be affected. The vulnerability does not directly compromise system integrity or availability but can indirectly lead to broader security incidents through successful phishing campaigns. Organizations with public-facing WordPress sites using this plugin are at risk, especially those with less stringent configuration management. The lack of authentication requirement lowers the barrier for attackers, but the high attack complexity and need for user interaction reduce the likelihood of automated mass exploitation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first ensure the WPO365 | MICROSOFT 365 GRAPH MAILER plugin is fully configured according to vendor recommendations, avoiding default or incomplete setups that leave the 'redirect_to' parameter unchecked. Implement strict validation and sanitization of all redirect URLs, allowing only trusted domains or relative paths to prevent redirection to untrusted sites. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect parameters. Educate users about the risks of clicking on unexpected links, especially those involving redirects. Monitor logs for unusual redirect patterns or spikes in traffic to unknown domains. If possible, disable or remove the plugin until a vendor patch is released. Stay updated with vendor advisories for official patches or updates addressing this issue. Additionally, consider implementing Content Security Policy (CSP) headers to restrict navigation to trusted domains and reduce the impact of open redirects.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-19T21:57:31.462Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b14b7ef31ef0b54ddb4

Added to database: 2/25/2026, 9:35:16 PM

Last enriched: 2/25/2026, 9:59:17 PM

Last updated: 2/26/2026, 11:30:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats