CVE-2025-66062: URL Redirection to Untrusted Site ('Open Redirect') in Frank Goossens WP YouTube Lyte
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Frank Goossens WP YouTube Lyte wp-youtube-lyte allows Phishing.This issue affects WP YouTube Lyte: from n/a through <= 1.7.28.
AI Analysis
Technical Summary
CVE-2025-66062 identifies an open redirect vulnerability in the WP YouTube Lyte plugin for WordPress, maintained by Frank Goossens. The vulnerability exists in versions up to and including 1.7.28, allowing attackers to manipulate URL parameters to redirect users from a legitimate site to an untrusted external domain. This type of vulnerability is commonly exploited in phishing attacks, where users are tricked into believing they are navigating within a trusted environment but are instead sent to malicious sites designed to steal credentials or deliver malware. The CVSS 3.1 score of 3.7 reflects a low severity primarily because the vulnerability does not directly compromise confidentiality, integrity, or availability of the affected system. The attack vector is network-based, with high attack complexity, no privileges required, and no user interaction needed, meaning an attacker can craft malicious URLs and distribute them without needing to compromise the site or user accounts. No known exploits have been reported in the wild, and no patches have been linked yet, indicating this is a recently disclosed issue. The vulnerability affects the plugin’s URL redirection logic, which likely fails to properly validate or sanitize redirect targets, enabling open redirect behavior. This can undermine user trust and facilitate social engineering attacks, particularly phishing. Organizations using this plugin on their WordPress sites should be aware of the risk and monitor for updates or apply temporary mitigations.
Potential Impact
For European organizations, the primary impact of CVE-2025-66062 lies in the increased risk of phishing attacks leveraging trusted domains running the vulnerable WP YouTube Lyte plugin. While the vulnerability itself does not allow direct compromise of systems or data, successful phishing campaigns can lead to credential theft, unauthorized access, or malware infections, which have broader security implications. This is particularly concerning for sectors with high reliance on WordPress for public-facing websites, such as media, e-commerce, education, and government services. The reputational damage from phishing incidents can be significant, especially under stringent European data protection regulations like GDPR, which mandate protection of user data and can impose fines for security failures. The low CVSS score reflects limited direct technical impact, but the indirect consequences through social engineering attacks can be substantial. Organizations with large user bases or customers in Europe may face increased targeting by attackers exploiting this vulnerability for phishing campaigns.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the WP YouTube Lyte plugin developer as soon as they become available to address the open redirect vulnerability. 2. In the absence of a patch, implement web application firewall (WAF) rules to detect and block suspicious redirect URLs or patterns associated with the plugin’s redirect functionality. 3. Conduct a thorough audit of all URL redirection mechanisms on affected WordPress sites to ensure proper validation and sanitization of redirect targets, restricting redirects to trusted domains only. 4. Educate website administrators and users about the risks of phishing and encourage vigilance when clicking on URLs, especially those received via email or social media. 5. Employ multi-factor authentication (MFA) on critical systems to mitigate the impact of credential theft resulting from phishing. 6. Use security plugins or tools that can detect and alert on unusual redirect behavior or potential phishing attempts originating from the site. 7. Regularly review and update incident response plans to include scenarios involving phishing attacks facilitated by open redirect vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-66062: URL Redirection to Untrusted Site ('Open Redirect') in Frank Goossens WP YouTube Lyte
Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Frank Goossens WP YouTube Lyte wp-youtube-lyte allows Phishing.This issue affects WP YouTube Lyte: from n/a through <= 1.7.28.
AI-Powered Analysis
Technical Analysis
CVE-2025-66062 identifies an open redirect vulnerability in the WP YouTube Lyte plugin for WordPress, maintained by Frank Goossens. The vulnerability exists in versions up to and including 1.7.28, allowing attackers to manipulate URL parameters to redirect users from a legitimate site to an untrusted external domain. This type of vulnerability is commonly exploited in phishing attacks, where users are tricked into believing they are navigating within a trusted environment but are instead sent to malicious sites designed to steal credentials or deliver malware. The CVSS 3.1 score of 3.7 reflects a low severity primarily because the vulnerability does not directly compromise confidentiality, integrity, or availability of the affected system. The attack vector is network-based, with high attack complexity, no privileges required, and no user interaction needed, meaning an attacker can craft malicious URLs and distribute them without needing to compromise the site or user accounts. No known exploits have been reported in the wild, and no patches have been linked yet, indicating this is a recently disclosed issue. The vulnerability affects the plugin’s URL redirection logic, which likely fails to properly validate or sanitize redirect targets, enabling open redirect behavior. This can undermine user trust and facilitate social engineering attacks, particularly phishing. Organizations using this plugin on their WordPress sites should be aware of the risk and monitor for updates or apply temporary mitigations.
Potential Impact
For European organizations, the primary impact of CVE-2025-66062 lies in the increased risk of phishing attacks leveraging trusted domains running the vulnerable WP YouTube Lyte plugin. While the vulnerability itself does not allow direct compromise of systems or data, successful phishing campaigns can lead to credential theft, unauthorized access, or malware infections, which have broader security implications. This is particularly concerning for sectors with high reliance on WordPress for public-facing websites, such as media, e-commerce, education, and government services. The reputational damage from phishing incidents can be significant, especially under stringent European data protection regulations like GDPR, which mandate protection of user data and can impose fines for security failures. The low CVSS score reflects limited direct technical impact, but the indirect consequences through social engineering attacks can be substantial. Organizations with large user bases or customers in Europe may face increased targeting by attackers exploiting this vulnerability for phishing campaigns.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the WP YouTube Lyte plugin developer as soon as they become available to address the open redirect vulnerability. 2. In the absence of a patch, implement web application firewall (WAF) rules to detect and block suspicious redirect URLs or patterns associated with the plugin’s redirect functionality. 3. Conduct a thorough audit of all URL redirection mechanisms on affected WordPress sites to ensure proper validation and sanitization of redirect targets, restricting redirects to trusted domains only. 4. Educate website administrators and users about the risks of phishing and encourage vigilance when clicking on URLs, especially those received via email or social media. 5. Employ multi-factor authentication (MFA) on critical systems to mitigate the impact of credential theft resulting from phishing. 6. Use security plugins or tools that can detect and alert on unusual redirect behavior or potential phishing attempts originating from the site. 7. Regularly review and update incident response plans to include scenarios involving phishing attacks facilitated by open redirect vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:20:39.726Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69205c2ec36be036e6ff26f3
Added to database: 11/21/2025, 12:33:50 PM
Last enriched: 1/21/2026, 12:17:40 AM
Last updated: 2/7/2026, 1:16:58 PM
Views: 118
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.