WordPress Event Tickets < 5.2.2 - Open Redirect
ID: CVE-2021-25028
Severity: medium
Author: dhiyaneshDk
Tags: cve2021,cve,wordpress,redirect,wp-plugin,eventtickets,wpscan,tri
Description
Section titled “Description”WordPress Event Tickets < 5.2.2 is susceptible to an open redirect vulnerability. The plugin does not validate the tribe_tickets_redirect_to parameter before redirecting the user to the given value, leading to an arbitrary redirect issue.
YAML Source
Section titled “YAML Source”id: CVE-2021-25028
info: name: WordPress Event Tickets < 5.2.2 - Open Redirect author: dhiyaneshDk severity: medium description: WordPress Event Tickets < 5.2.2 is susceptible to an open redirect vulnerability. The plugin does not validate the tribe_tickets_redirect_to parameter before redirecting the user to the given value, leading to an arbitrary redirect issue. remediation: | Update to the latest version of the WordPress Event Tickets plugin (5.2.2 or higher) to fix the open redirect vulnerability. reference: - https://wpscan.com/vulnerability/80b0682e-2c3b-441b-9628-6462368e5fc7 - https://nvd.nist.gov/vuln/detail/CVE-2021-25028 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-25028 cwe-id: CWE-601 epss-score: 0.00106 epss-percentile: 0.42838 cpe: cpe:2.3:a:tri:event_tickets:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: tri product: event_tickets framework: wordpress tags: cve2021,cve,wordpress,redirect,wp-plugin,eventtickets,wpscan,tri
http: - method: GET path: - "{{BaseURL}}/wp-admin/admin.php?page=wp_ajax_rsvp-form&tribe_tickets_redirect_to=https://interact.sh"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1# digest: 4a0a0047304502201886dc902afd016006391161daf3c938740544340f39799939bc215a9f1ffb3c02210088a05c5b92aef775699f91f1ff7ecec8c4294428cb0229de8f380c57cb308746:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-25028.yaml"