CVE-2025-60151: URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms HubSpot
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms HubSpot gf-hubspot allows Phishing.This issue affects WP Gravity Forms HubSpot: from n/a through <= 1.2.5.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-60151 exists in the WP Gravity Forms HubSpot plugin by CRM Perks, specifically versions up to 1.2.5. It is an Open Redirect flaw where the application improperly validates URLs before redirecting users, enabling attackers to craft URLs that redirect victims to malicious external sites. This can facilitate phishing attacks by exploiting user trust in the legitimate site. The CVSS 3.1 base score is 4.7 (medium), with network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and limited confidentiality impact. No patch or vendor advisory is currently provided, and no exploits are known in the wild.
Potential Impact
The primary impact is the potential for phishing attacks due to the ability to redirect users to untrusted sites. There is no direct impact on data confidentiality, integrity, or availability. The vulnerability could be used to deceive users into visiting malicious websites, potentially leading to credential theft or other social engineering outcomes. However, the vulnerability itself does not enable direct system compromise or data breach.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should exercise caution when clicking on URLs generated by the affected plugin. Monitoring for updates from CRM Perks regarding a patch is recommended. No vendor advisory or official fix information is currently available.
CVE-2025-60151: URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms HubSpot
Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms HubSpot gf-hubspot allows Phishing.This issue affects WP Gravity Forms HubSpot: from n/a through <= 1.2.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-60151 exists in the WP Gravity Forms HubSpot plugin by CRM Perks, specifically versions up to 1.2.5. It is an Open Redirect flaw where the application improperly validates URLs before redirecting users, enabling attackers to craft URLs that redirect victims to malicious external sites. This can facilitate phishing attacks by exploiting user trust in the legitimate site. The CVSS 3.1 base score is 4.7 (medium), with network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and limited confidentiality impact. No patch or vendor advisory is currently provided, and no exploits are known in the wild.
Potential Impact
The primary impact is the potential for phishing attacks due to the ability to redirect users to untrusted sites. There is no direct impact on data confidentiality, integrity, or availability. The vulnerability could be used to deceive users into visiting malicious websites, potentially leading to credential theft or other social engineering outcomes. However, the vulnerability itself does not enable direct system compromise or data breach.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should exercise caution when clicking on URLs generated by the affected plugin. Monitoring for updates from CRM Perks regarding a patch is recommended. No vendor advisory or official fix information is currently available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-25T15:28:03.106Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8eff504677bbd79439a7b
Added to database: 10/22/2025, 2:53:41 PM
Last enriched: 4/29/2026, 4:17:33 AM
Last updated: 5/10/2026, 4:37:20 AM
Views: 100
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.