Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60151: URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms HubSpot

0
Medium
VulnerabilityCVE-2025-60151cvecve-2025-60151
Published: Wed Oct 22 2025 (10/22/2025, 14:32:41 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms HubSpot

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms HubSpot gf-hubspot allows Phishing.This issue affects WP Gravity Forms HubSpot: from n/a through <= 1.2.5.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:42:45 UTC

Technical Analysis

CVE-2025-60151 is an Open Redirect vulnerability identified in the CRM Perks WP Gravity Forms HubSpot plugin, affecting versions up to and including 1.2.5. This plugin integrates WordPress Gravity Forms with HubSpot CRM, enabling data synchronization and marketing automation. The vulnerability arises because the plugin improperly validates URLs used for redirection, allowing attackers to craft malicious URLs that redirect users to arbitrary, untrusted external websites. This behavior can be exploited in phishing campaigns, where users are tricked into clicking on seemingly legitimate links that lead to malicious sites designed to steal credentials or deliver malware. The vulnerability requires no authentication (AV:N) and has low attack complexity (AC:L), but does require user interaction (UI:R) to follow the malicious link. The scope is changed (S:C) because the redirection can lead users outside the trusted domain, impacting confidentiality (C:L) but not integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved on 2025-09-25 and published on 2025-10-22. Given the widespread use of WordPress and HubSpot integrations, this vulnerability poses a moderate risk to organizations relying on these technologies for customer engagement and data collection.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of user data by facilitating phishing attacks that can lead to credential theft or unauthorized access. Organizations using the affected plugin in customer-facing environments risk their users being redirected to malicious sites, potentially damaging brand reputation and customer trust. While the vulnerability does not directly compromise system integrity or availability, successful phishing can lead to broader security incidents, including account takeover or data breaches. The impact is more pronounced for sectors with high customer interaction via web forms, such as e-commerce, financial services, and marketing agencies. The medium CVSS score reflects a moderate risk, but the ease of exploitation and potential for social engineering elevate the threat in practice. European GDPR regulations also impose strict requirements on protecting user data, so exploitation could lead to regulatory penalties if user data is compromised.

Mitigation Recommendations

Organizations should monitor for updates from CRM Perks and apply patches promptly once available to fix the Open Redirect vulnerability. In the interim, implement strict URL validation and sanitization on all form inputs and redirection parameters to ensure only trusted domains are allowed. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirection attempts. Educate users and staff about phishing risks, emphasizing caution when clicking on links, especially those received via email or external sources. Review and limit the use of third-party plugins, ensuring only necessary and actively maintained components are deployed. Conduct regular security assessments and penetration testing focused on web application flows involving redirects. Additionally, consider implementing Content Security Policy (CSP) headers to restrict navigation to trusted domains and use multi-factor authentication to reduce the impact of credential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:03.106Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f8eff504677bbd79439a7b

Added to database: 10/22/2025, 2:53:41 PM

Last enriched: 1/20/2026, 9:42:45 PM

Last updated: 2/7/2026, 8:49:42 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats