CVE-2021-24210
MEDIUM NUCLEIKiboit Phastpress < 1.111 - Open Redirect
Title source: ruleDescription
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.
Nuclei Templates (1)
WordPress PhastPress <1.111 - Open Redirect
MEDIUMby 0x_Akoko
Scores
CVSS v3
6.1
EPSS
0.3538
EPSS Percentile
97.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-601
Status
published
Products (1)
kiboit/phastpress
< 1.111
Published
Apr 05, 2021
Tracked Since
Feb 18, 2026