Skip to main content

CVE-2025-47454: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms Dynamics CRM

Medium
VulnerabilityCVE-2025-47454cvecve-2025-47454cwe-601
Published: Wed May 07 2025 (05/07/2025, 14:19:36 UTC)
Source: CVE
Vendor/Project: CRM Perks
Product: WP Gravity Forms Dynamics CRM

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms Dynamics CRM allows Phishing. This issue affects WP Gravity Forms Dynamics CRM: from n/a through 1.1.4.

AI-Powered Analysis

AILast updated: 07/05/2025, 12:13:00 UTC

Technical Analysis

CVE-2025-47454 is an Open Redirect vulnerability (CWE-601) identified in the CRM Perks WP Gravity Forms Dynamics CRM plugin, affecting versions up to 1.1.4. This vulnerability allows an attacker to craft malicious URLs that redirect users to untrusted external sites when interacting with the plugin's URL redirection functionality. The vulnerability arises because the plugin does not properly validate or restrict the destination URLs, enabling attackers to exploit this behavior to facilitate phishing attacks. Specifically, users clicking on what appears to be legitimate links associated with the CRM Perks plugin could be redirected to malicious websites controlled by attackers, potentially leading to credential theft or malware distribution. The CVSS v3.1 base score is 4.7 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction (clicking the link). The impact is limited to confidentiality as the vulnerability does not directly affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is particularly relevant for organizations using WordPress sites integrated with the WP Gravity Forms Dynamics CRM plugin, which is commonly used to streamline customer relationship management workflows within WordPress environments.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through phishing campaigns leveraging trusted WordPress sites using the affected plugin. Successful exploitation could lead to user credential compromise or malware infections, potentially resulting in unauthorized access to sensitive corporate or customer data. This risk is heightened in sectors with high reliance on CRM systems integrated into public-facing websites, such as retail, professional services, and public administration. The redirection vulnerability could undermine user trust and damage brand reputation if customers or employees are targeted. While the vulnerability does not directly compromise system integrity or availability, the indirect consequences of phishing—such as account takeover or lateral movement—could have significant operational impacts. Additionally, organizations subject to GDPR must consider the implications of potential data breaches resulting from phishing attacks facilitated by this vulnerability, which could lead to regulatory penalties and remediation costs.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability beyond generic advice. First, identify all WordPress instances using the WP Gravity Forms Dynamics CRM plugin and verify the plugin version. Until an official patch is released, implement strict URL validation and sanitization at the web application firewall (WAF) or reverse proxy level to block suspicious or external redirect URLs originating from the plugin's endpoints. Employ Content Security Policy (CSP) headers to restrict navigation to trusted domains. Educate users and administrators about the risk of phishing via open redirects and encourage vigilance when clicking links, especially those originating from CRM-related communications. Monitor web server logs for unusual redirect patterns or spikes in outbound traffic to untrusted domains. Once a patch is available, prioritize prompt update of the plugin. Additionally, consider deploying multi-factor authentication (MFA) on CRM and related systems to reduce the impact of credential compromise. Regularly audit and harden WordPress security configurations to minimize the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:38:40.260Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd9488

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 12:13:00 PM

Last updated: 8/16/2025, 7:50:55 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats