CVE-2021-24210

MEDIUM NUCLEI

Kiboit Phastpress < 1.111 - Open Redirect

Title source: rule

Description

There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.

Nuclei Templates (1)

WordPress PhastPress <1.111 - Open Redirect
MEDIUMby 0x_Akoko

Scores

CVSS v3 6.1
EPSS 0.3538
EPSS Percentile 97.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

CWE
CWE-601
Status published
Products (1)
kiboit/phastpress < 1.111
Published Apr 05, 2021
Tracked Since Feb 18, 2026