SB2019052101 - Open redirect in Newsletter Manager plugin for WordPress
Published: May 21, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Open redirect (CVE-ID: N/A)
The vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data passed via "appurl" HTTP GET parameter within the "/newsletter-manager/confirmation.php" script. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
Example:
http://host[]?wp_nlm=confirmation&appurl=<BASE64_ENCODED_LINK> Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.