CVE-2025-49325
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-06

Last updated on: 2026-04-23

Assigner: Patchstack

Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Automattic Newspack Newsletters newspack-newsletters allows Phishing.This issue affects Newspack Newsletters: from n/a through <= 3.13.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-06
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-49325 is an Open Redirection vulnerability in the WordPress Newspack Newsletters plugin up to version 3.13.0. The plugin does not properly validate redirect URLs, allowing attackers to redirect users from a legitimate site to a malicious one. This can be exploited to facilitate phishing attacks by tricking users into visiting harmful websites. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by enabling attackers to redirect your users to malicious websites, potentially leading to phishing attacks. Users may be tricked into providing sensitive information or downloading malware, which can compromise security and trust in your site. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if your WordPress site is running the Newspack Newsletters plugin version 3.13.0 or earlier, as these versions are affected. Since the issue involves improper validation of redirect URLs, you can test for open redirects by attempting to access URLs that redirect through the plugin to untrusted sites. Specific commands are not provided, but you can verify the plugin version via WordPress admin or by inspecting the plugin files. Additionally, monitoring HTTP requests for suspicious redirect patterns may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to update the Newspack Newsletters plugin to version 3.14.0 or later, where the issue is fixed. As an interim measure, you can apply virtual patching (vPatching) offered by Patchstack, which automatically mitigates the vulnerability even before the official patch is applied. These steps will prevent attackers from exploiting the open redirect vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart