Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67587: URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms FreshDesk Plugin

0
Medium
VulnerabilityCVE-2025-67587cvecve-2025-67587
Published: Tue Dec 09 2025 (12/09/2025, 14:14:16 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms FreshDesk Plugin

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms FreshDesk Plugin gf-freshdesk allows Phishing.This issue affects WP Gravity Forms FreshDesk Plugin: from n/a through <= 1.3.5.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:05:16 UTC

Technical Analysis

CVE-2025-67587 identifies an Open Redirect vulnerability in the CRM Perks WP Gravity Forms FreshDesk Plugin, specifically affecting versions up to and including 1.3.5. The vulnerability arises because the plugin improperly validates URLs used in redirection parameters, allowing attackers to manipulate these parameters to redirect users to arbitrary, potentially malicious external websites. This behavior can be exploited in phishing campaigns where attackers send crafted URLs appearing to originate from legitimate WordPress sites using this plugin, thereby increasing the likelihood of users clicking on malicious links. The vulnerability does not require any authentication or privileges to exploit, but it does require the victim to interact with the malicious URL. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited impact on confidentiality (partial disclosure risk through phishing) and no direct impact on integrity or availability. No known public exploits have been reported, but the risk remains significant given the widespread use of WordPress and FreshDesk integrations in customer support environments. The vulnerability is particularly relevant for organizations relying on this plugin for customer interaction forms, as it undermines user trust and can lead to credential theft or malware delivery through phishing. The lack of an official patch link suggests that remediation may require vendor updates or manual mitigation strategies.

Potential Impact

For European organizations, the primary impact of this vulnerability is the increased risk of successful phishing attacks leveraging trusted domains. Attackers can exploit the open redirect to bypass URL filters and security gateways, potentially leading to credential theft, unauthorized access, or malware infections. This can damage organizational reputation, especially for customer-facing portals using FreshDesk integrations. Since the vulnerability does not affect data integrity or availability directly, the impact is mostly on confidentiality and user trust. Organizations in sectors with high customer interaction, such as e-commerce, finance, and public services, may face elevated risks. Additionally, regulatory frameworks like GDPR impose strict requirements on protecting user data and preventing phishing, so exploitation could lead to compliance issues and fines. The medium severity rating indicates that while the threat is not critical, it should not be ignored, especially given the ease of exploitation and the potential for social engineering attacks.

Mitigation Recommendations

1. Monitor CRM Perks and WordPress plugin repositories for official patches addressing CVE-2025-67587 and apply updates promptly once available. 2. Implement strict validation and sanitization of all URL parameters used for redirection within the plugin or via custom code to ensure only trusted internal URLs are allowed. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns related to this plugin. 4. Educate end users and support staff about phishing risks, emphasizing caution when clicking on links, even from trusted domains. 5. Consider disabling or replacing the WP Gravity Forms FreshDesk Plugin if immediate patching is not feasible, especially on high-risk or public-facing sites. 6. Use Content Security Policy (CSP) headers to restrict navigation to trusted domains. 7. Regularly audit website logs for unusual redirect activity that may indicate exploitation attempts. 8. Coordinate with incident response teams to prepare for potential phishing campaigns exploiting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:39.680Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ae29cea75c35ae575e

Added to database: 12/9/2025, 2:35:26 PM

Last enriched: 1/21/2026, 1:05:16 AM

Last updated: 2/7/2026, 9:33:48 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats