CVE-2025-68884
BaseFortify
Publication date: 2026-01-22
Last updated on: 2026-01-27
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| arevico | wp_simple_redirect | to 1.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-68884 is a medium severity Cross Site Scripting (XSS) vulnerability in the WordPress WP Simple Redirect Plugin (versions up to 1.1). It allows an attacker to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, into a website. These scripts execute when visitors access the compromised site. Exploitation requires user interaction, like clicking a malicious link or visiting a crafted page, and no authentication is needed to initiate the attack. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute malicious scripts on your website, potentially redirecting visitors to harmful sites, displaying unwanted advertisements, or executing other harmful HTML payloads. This can lead to compromised user trust, potential data theft, or further exploitation of your website. Since no authentication is required, any visitor could be targeted if they interact with crafted content. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve monitoring for suspicious HTTP requests containing malicious script payloads targeting the WP Simple Redirect plugin endpoints. Since the vulnerability is a reflected XSS, testing can be done by sending crafted requests with typical XSS payloads (e.g., <script>alert(1)</script>) to the plugin's URL parameters and observing if the payload is reflected unescaped in the response. Specific commands are not provided in the resources, but using tools like curl or Burp Suite to send such crafted requests can help detect the vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
Since no official patch is available as of the publication date, immediate mitigation involves applying the Patchstack mitigation rule issued to block attacks targeting this vulnerability. Users are advised to implement this mitigation immediately to protect their websites until an official patch is released. [1]