Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66062: URL Redirection to Untrusted Site ('Open Redirect') in Frank Goossens WP YouTube Lyte

0
Low
VulnerabilityCVE-2025-66062cvecve-2025-66062
Published: Fri Nov 21 2025 (11/21/2025, 12:29:54 UTC)
Source: CVE Database V5
Vendor/Project: Frank Goossens
Product: WP YouTube Lyte

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Frank Goossens WP YouTube Lyte wp-youtube-lyte allows Phishing.This issue affects WP YouTube Lyte: from n/a through <= 1.7.28.

AI-Powered Analysis

AILast updated: 11/21/2025, 13:07:47 UTC

Technical Analysis

The vulnerability identified as CVE-2025-66062 affects the WP YouTube Lyte plugin developed by Frank Goossens, specifically versions up to and including 1.7.28. This vulnerability is categorized as an 'Open Redirect,' where the plugin improperly validates URLs used for redirection purposes. An attacker can exploit this by crafting malicious URLs that appear to originate from a legitimate site using the plugin but redirect users to untrusted external websites. Such redirects are commonly used in phishing campaigns to trick users into divulging sensitive information or downloading malware. The vulnerability does not require authentication or user interaction beyond clicking a manipulated link, making it relatively easy to exploit. Although no public exploits have been reported yet, the presence of this flaw in a widely used WordPress plugin increases the risk of targeted phishing attacks. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate attention from site administrators. The vulnerability impacts the confidentiality and integrity of user data by enabling phishing and potentially leading to credential theft or further compromise.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress websites with the WP YouTube Lyte plugin installed. Attackers can exploit the open redirect to conduct phishing campaigns targeting employees, customers, or partners, potentially leading to credential compromise, unauthorized access, and data breaches. This can result in reputational damage, regulatory penalties under GDPR for failing to protect user data, and operational disruptions if malware is delivered through the redirected links. Organizations in sectors such as finance, healthcare, and e-commerce, which are frequent phishing targets, face heightened risks. Additionally, the trustworthiness of corporate websites may be undermined, affecting customer confidence and business continuity. The ease of exploitation and the broad user base of WordPress amplify the potential scale of impact across Europe.

Mitigation Recommendations

1. Immediately monitor for updates from the WP YouTube Lyte plugin developer and apply patches as soon as they are released. 2. Until a patch is available, disable or remove the WP YouTube Lyte plugin from websites to eliminate the attack vector. 3. Implement strict URL validation and sanitization on all redirect parameters within the website to prevent open redirects. 4. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious redirect attempts. 5. Educate users and employees about phishing risks, emphasizing caution when clicking on links, even from trusted domains. 6. Conduct regular security audits of WordPress plugins and themes to identify and remediate vulnerabilities proactively. 7. Use Content Security Policy (CSP) headers to restrict the domains to which users can be redirected. 8. Monitor web traffic for unusual redirect patterns or spikes that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:20:39.726Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69205c2ec36be036e6ff26f3

Added to database: 11/21/2025, 12:33:50 PM

Last enriched: 11/21/2025, 1:07:47 PM

Last updated: 11/22/2025, 2:39:44 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats