CVE-2025-49325
BaseFortify
Publication date: 2025-06-06
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-49325 is an Open Redirection vulnerability in the WordPress Newspack Newsletters plugin up to version 3.13.0. The plugin does not properly validate redirect URLs, allowing attackers to redirect users from a legitimate site to a malicious one. This can be exploited to facilitate phishing attacks by tricking users into visiting harmful websites. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by enabling attackers to redirect your users to malicious websites, potentially leading to phishing attacks. Users may be tricked into providing sensitive information or downloading malware, which can compromise security and trust in your site. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if your WordPress site is running the Newspack Newsletters plugin version 3.13.0 or earlier, as these versions are affected. Since the issue involves improper validation of redirect URLs, you can test for open redirects by attempting to access URLs that redirect through the plugin to untrusted sites. Specific commands are not provided, but you can verify the plugin version via WordPress admin or by inspecting the plugin files. Additionally, monitoring HTTP requests for suspicious redirect patterns may help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Newspack Newsletters plugin to version 3.14.0 or later, where the issue is fixed. As an interim measure, you can apply virtual patching (vPatching) offered by Patchstack, which automatically mitigates the vulnerability even before the official patch is applied. These steps will prevent attackers from exploiting the open redirect vulnerability. [1]