Skip to main content

CVE-2025-30953: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms Salesforce

Medium
VulnerabilityCVE-2025-30953cvecve-2025-30953cwe-601
Published: Fri Jun 06 2025 (06/06/2025, 12:54:10 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms Salesforce

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms Salesforce allows Phishing. This issue affects WP Gravity Forms Salesforce: from n/a through 1.4.7.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:42:01 UTC

Technical Analysis

CVE-2025-30953 is a medium-severity security vulnerability classified under CWE-601, which corresponds to an 'Open Redirect' or URL Redirection to Untrusted Site issue. This vulnerability affects the CRM Perks WP Gravity Forms Salesforce plugin, specifically versions up to 1.4.7. The flaw allows an attacker to craft malicious URLs that redirect users from a legitimate site using the vulnerable plugin to an untrusted external site. Such redirection can be exploited in phishing campaigns, where users are tricked into believing they are interacting with a trusted entity but are instead sent to malicious websites designed to steal credentials or deliver malware. The vulnerability has a CVSS 3.1 base score of 4.7, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N) shows that the attack can be performed remotely over the network without privileges, requires low attack complexity, no privileges, but does require user interaction (clicking the malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact is limited to confidentiality (C:L) with no impact on integrity or availability. No known exploits in the wild have been reported yet, and no patches are currently linked, suggesting that remediation may still be pending or in progress. The vulnerability primarily facilitates phishing by redirecting users to malicious sites, leveraging the trust users place in the legitimate website hosting the vulnerable plugin.

Potential Impact

For European organizations, especially those using WordPress sites with the CRM Perks WP Gravity Forms Salesforce plugin, this vulnerability poses a significant risk of phishing attacks. Attackers can exploit the open redirect to bypass security filters and convince users to visit malicious sites, potentially leading to credential theft, unauthorized access, or malware infections. This can undermine user trust, damage brand reputation, and lead to regulatory compliance issues under GDPR if personal data is compromised. Since the vulnerability does not directly impact system integrity or availability, the primary concern is the confidentiality of user data and the potential for social engineering attacks. Organizations with customer-facing portals or forms integrated with Salesforce via this plugin are particularly at risk. The medium severity score reflects that while the vulnerability is not critical, it can be leveraged as part of a broader attack chain, especially in targeted phishing campaigns against employees or customers.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Identify and inventory all WordPress installations using the CRM Perks WP Gravity Forms Salesforce plugin and verify the version in use. 2) Monitor the vendor's official channels for patches or updates addressing CVE-2025-30953 and apply them promptly once available. 3) Implement strict URL validation and sanitization on all redirect parameters within the plugin or via custom code to ensure redirects only point to trusted domains. 4) Employ web application firewalls (WAFs) with rules designed to detect and block open redirect attempts targeting this plugin. 5) Educate users and employees about phishing risks, emphasizing caution with unexpected links, especially those originating from forms or Salesforce integrations. 6) Use multi-factor authentication (MFA) on Salesforce and related systems to reduce the impact of credential theft. 7) Regularly audit and monitor web traffic logs for unusual redirect patterns or spikes in traffic to suspicious domains. 8) Consider disabling or replacing the vulnerable plugin if immediate patching is not feasible, especially on high-risk or public-facing sites.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:22:20.465Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842eddd71f4d251b5c88003

Added to database: 6/6/2025, 1:32:13 PM

Last enriched: 7/8/2025, 3:42:01 AM

Last updated: 8/5/2025, 4:16:15 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats