Skip to main content

CVE-2025-9034: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Wp Edit Password Protected

Medium
VulnerabilityCVE-2025-9034cvecve-2025-9034cwe-601
Published: Thu Sep 11 2025 (09/11/2025, 06:00:02 UTC)
Source: CVE Database V5
Product: Wp Edit Password Protected

Description

The Wp Edit Password Protected WordPress plugin before 1.3.5 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue

AI-Powered Analysis

AILast updated: 09/11/2025, 14:50:41 UTC

Technical Analysis

CVE-2025-9034 is a medium severity vulnerability classified as an Open Redirect issue (CWE-601) found in the WordPress plugin 'Wp Edit Password Protected' prior to version 1.3.5. The vulnerability arises because the plugin fails to properly validate a URL parameter before redirecting users to the URL specified by that parameter. This lack of validation allows an attacker to craft a malicious URL that, when clicked by a user, redirects them to an untrusted external site. Such open redirects can be exploited in phishing attacks, where users are tricked into believing they are navigating to a legitimate site but are instead sent to malicious domains designed to steal credentials, deliver malware, or conduct other fraudulent activities. The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) shows that the vulnerability is remotely exploitable over the network without privileges but requires user interaction (clicking the malicious link). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component, and the impact affects confidentiality and integrity to a low degree, with no impact on availability. No known exploits are currently reported in the wild, and no patches or fixes are linked yet, but the vulnerability is publicly disclosed as of September 11, 2025. The affected product is a WordPress plugin used to protect content with password restrictions, and the vulnerability could be leveraged to redirect users away from trusted content to malicious sites.

Potential Impact

For European organizations using the 'Wp Edit Password Protected' plugin on their WordPress sites, this vulnerability poses a moderate risk primarily related to user trust and potential credential theft. Attackers could exploit the open redirect to conduct phishing campaigns targeting employees, customers, or partners by embedding malicious URLs in emails or social media. This could lead to unauthorized disclosure of sensitive information if users are redirected to credential harvesting sites. Additionally, the integrity of user sessions could be compromised if attackers use the redirect to facilitate session hijacking or man-in-the-middle attacks. While the vulnerability does not directly impact system availability, the reputational damage and potential data breaches could have regulatory implications under GDPR, especially if personal data is compromised. The requirement for user interaction means that successful exploitation depends on social engineering, but given the widespread use of WordPress in Europe and the popularity of plugins for content protection, the attack surface is significant. Organizations with public-facing WordPress sites that use this plugin should be particularly vigilant.

Mitigation Recommendations

European organizations should immediately verify if they use the 'Wp Edit Password Protected' plugin and identify the version in use. If the version is prior to 1.3.5, they should upgrade to the latest version as soon as it becomes available, since no patch links are currently provided but the vendor is expected to release a fix. In the interim, organizations can implement web application firewall (WAF) rules to detect and block suspicious redirect parameters or URLs containing redirect payloads. Additionally, security teams should educate users about the risks of clicking on unexpected or suspicious links, especially those that appear to redirect to unknown domains. Monitoring web server logs for unusual redirect patterns can help detect exploitation attempts. Organizations should also review their email filtering and phishing detection capabilities to reduce the risk of malicious links reaching end users. Finally, developers maintaining WordPress sites should audit custom code and third-party plugins for similar open redirect issues and apply strict URL validation and allowlisting wherever redirects are necessary.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-08-14T12:29:06.846Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c2e1a5a8af254b635031c6

Added to database: 9/11/2025, 2:50:13 PM

Last enriched: 9/11/2025, 2:50:41 PM

Last updated: 9/11/2025, 2:50:52 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats