Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67587: URL Redirection to Untrusted Site ('Open Redirect') in CRM Perks WP Gravity Forms FreshDesk Plugin

0
Medium
VulnerabilityCVE-2025-67587cvecve-2025-67587
Published: Tue Dec 09 2025 (12/09/2025, 14:14:16 UTC)
Source: CVE Database V5
Vendor/Project: CRM Perks
Product: WP Gravity Forms FreshDesk Plugin

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks WP Gravity Forms FreshDesk Plugin gf-freshdesk allows Phishing.This issue affects WP Gravity Forms FreshDesk Plugin: from n/a through <= 1.3.5.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:53:18 UTC

Technical Analysis

CVE-2025-67587 identifies an Open Redirect vulnerability in the CRM Perks WP Gravity Forms FreshDesk Plugin, specifically affecting versions up to 1.3.5. The plugin integrates Gravity Forms, a popular WordPress form builder, with FreshDesk, a customer support platform. The vulnerability arises because the plugin improperly validates URLs used in redirection processes, allowing attackers to manipulate redirect parameters to point users to arbitrary, untrusted external websites. This can be exploited by crafting malicious URLs that appear legitimate but redirect victims to phishing or malware-hosting sites. The vulnerability does not require authentication and can be exploited via social engineering, making it a vector for phishing campaigns. While no public exploits are currently reported, the flaw's presence in widely used WordPress environments increases its risk profile. The lack of a CVSS score indicates the need for a severity assessment based on impact and exploitability. The vulnerability primarily threatens confidentiality and integrity by enabling phishing attacks that can lead to credential theft or malware infection. The plugin's user base, particularly in European markets where WordPress and FreshDesk are popular, may be targeted. No official patches or mitigations have been published yet, but standard best practices for open redirect vulnerabilities apply.

Potential Impact

For European organizations, this vulnerability poses a significant phishing risk, potentially leading to credential compromise, unauthorized access, and reputational damage. Organizations relying on WordPress sites with the CRM Perks WP Gravity Forms FreshDesk Plugin may see increased phishing attempts leveraging trusted domains to deceive users. This can undermine customer trust and lead to data breaches if attackers harvest login credentials or deploy malware. The impact is heightened in sectors with high customer interaction and support ticketing, such as finance, healthcare, and e-commerce. Additionally, regulatory implications under GDPR may arise if personal data is compromised due to phishing facilitated by this vulnerability. The ease of exploitation without authentication and the broad scope of affected WordPress sites amplify the threat. However, the vulnerability does not directly compromise server integrity or availability, limiting its impact to user-facing phishing risks.

Mitigation Recommendations

1. Monitor for an official patch from CRM Perks and apply updates to the WP Gravity Forms FreshDesk Plugin promptly once available. 2. Until a patch is released, implement strict input validation and sanitization on URL parameters used for redirection within the plugin or via web application firewalls (WAFs). 3. Employ URL whitelisting to restrict redirects only to trusted domains, preventing arbitrary external redirects. 4. Educate users and staff about phishing risks, emphasizing caution with unexpected links, even from trusted domains. 5. Use security plugins or WAF rules that detect and block open redirect attempts. 6. Conduct regular security audits of WordPress plugins and remove or replace those no longer maintained or vulnerable. 7. Monitor logs for suspicious redirect activity and anomalous user behavior that may indicate phishing exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:39.680Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ae29cea75c35ae575e

Added to database: 12/9/2025, 2:35:26 PM

Last enriched: 12/9/2025, 2:53:18 PM

Last updated: 12/10/2025, 4:15:24 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats