CVE-2025-67587: URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms FreshDesk Plugin
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms FreshDesk Plugin gf-freshdesk allows Phishing.This issue affects WP Gravity Forms FreshDesk Plugin: from n/a through <= 1.3.5.
AI Analysis
Technical Summary
CVE-2025-67587 identifies an Open Redirect vulnerability in the CRM Perks WP Gravity Forms FreshDesk Plugin, specifically affecting versions up to and including 1.3.5. The vulnerability arises because the plugin improperly validates URLs used in redirection parameters, allowing attackers to manipulate these parameters to redirect users to arbitrary, potentially malicious external websites. This behavior can be exploited in phishing campaigns where attackers send crafted URLs appearing to originate from legitimate WordPress sites using this plugin, thereby increasing the likelihood of users clicking on malicious links. The vulnerability does not require any authentication or privileges to exploit, but it does require the victim to interact with the malicious URL. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited impact on confidentiality (partial disclosure risk through phishing) and no direct impact on integrity or availability. No known public exploits have been reported, but the risk remains significant given the widespread use of WordPress and FreshDesk integrations in customer support environments. The vulnerability is particularly relevant for organizations relying on this plugin for customer interaction forms, as it undermines user trust and can lead to credential theft or malware delivery through phishing. The lack of an official patch link suggests that remediation may require vendor updates or manual mitigation strategies.
Potential Impact
For European organizations, the primary impact of this vulnerability is the increased risk of successful phishing attacks leveraging trusted domains. Attackers can exploit the open redirect to bypass URL filters and security gateways, potentially leading to credential theft, unauthorized access, or malware infections. This can damage organizational reputation, especially for customer-facing portals using FreshDesk integrations. Since the vulnerability does not affect data integrity or availability directly, the impact is mostly on confidentiality and user trust. Organizations in sectors with high customer interaction, such as e-commerce, finance, and public services, may face elevated risks. Additionally, regulatory frameworks like GDPR impose strict requirements on protecting user data and preventing phishing, so exploitation could lead to compliance issues and fines. The medium severity rating indicates that while the threat is not critical, it should not be ignored, especially given the ease of exploitation and the potential for social engineering attacks.
Mitigation Recommendations
1. Monitor CRM Perks and WordPress plugin repositories for official patches addressing CVE-2025-67587 and apply updates promptly once available. 2. Implement strict validation and sanitization of all URL parameters used for redirection within the plugin or via custom code to ensure only trusted internal URLs are allowed. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns related to this plugin. 4. Educate end users and support staff about phishing risks, emphasizing caution when clicking on links, even from trusted domains. 5. Consider disabling or replacing the WP Gravity Forms FreshDesk Plugin if immediate patching is not feasible, especially on high-risk or public-facing sites. 6. Use Content Security Policy (CSP) headers to restrict navigation to trusted domains. 7. Regularly audit website logs for unusual redirect activity that may indicate exploitation attempts. 8. Coordinate with incident response teams to prepare for potential phishing campaigns exploiting this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-67587: URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms FreshDesk Plugin
Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms FreshDesk Plugin gf-freshdesk allows Phishing.This issue affects WP Gravity Forms FreshDesk Plugin: from n/a through <= 1.3.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-67587 identifies an Open Redirect vulnerability in the CRM Perks WP Gravity Forms FreshDesk Plugin, specifically affecting versions up to and including 1.3.5. The vulnerability arises because the plugin improperly validates URLs used in redirection parameters, allowing attackers to manipulate these parameters to redirect users to arbitrary, potentially malicious external websites. This behavior can be exploited in phishing campaigns where attackers send crafted URLs appearing to originate from legitimate WordPress sites using this plugin, thereby increasing the likelihood of users clicking on malicious links. The vulnerability does not require any authentication or privileges to exploit, but it does require the victim to interact with the malicious URL. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited impact on confidentiality (partial disclosure risk through phishing) and no direct impact on integrity or availability. No known public exploits have been reported, but the risk remains significant given the widespread use of WordPress and FreshDesk integrations in customer support environments. The vulnerability is particularly relevant for organizations relying on this plugin for customer interaction forms, as it undermines user trust and can lead to credential theft or malware delivery through phishing. The lack of an official patch link suggests that remediation may require vendor updates or manual mitigation strategies.
Potential Impact
For European organizations, the primary impact of this vulnerability is the increased risk of successful phishing attacks leveraging trusted domains. Attackers can exploit the open redirect to bypass URL filters and security gateways, potentially leading to credential theft, unauthorized access, or malware infections. This can damage organizational reputation, especially for customer-facing portals using FreshDesk integrations. Since the vulnerability does not affect data integrity or availability directly, the impact is mostly on confidentiality and user trust. Organizations in sectors with high customer interaction, such as e-commerce, finance, and public services, may face elevated risks. Additionally, regulatory frameworks like GDPR impose strict requirements on protecting user data and preventing phishing, so exploitation could lead to compliance issues and fines. The medium severity rating indicates that while the threat is not critical, it should not be ignored, especially given the ease of exploitation and the potential for social engineering attacks.
Mitigation Recommendations
1. Monitor CRM Perks and WordPress plugin repositories for official patches addressing CVE-2025-67587 and apply updates promptly once available. 2. Implement strict validation and sanitization of all URL parameters used for redirection within the plugin or via custom code to ensure only trusted internal URLs are allowed. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns related to this plugin. 4. Educate end users and support staff about phishing risks, emphasizing caution when clicking on links, even from trusted domains. 5. Consider disabling or replacing the WP Gravity Forms FreshDesk Plugin if immediate patching is not feasible, especially on high-risk or public-facing sites. 6. Use Content Security Policy (CSP) headers to restrict navigation to trusted domains. 7. Regularly audit website logs for unusual redirect activity that may indicate exploitation attempts. 8. Coordinate with incident response teams to prepare for potential phishing campaigns exploiting this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:39.680Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833ae29cea75c35ae575e
Added to database: 12/9/2025, 2:35:26 PM
Last enriched: 1/21/2026, 1:05:16 AM
Last updated: 2/4/2026, 4:51:10 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowCVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.