WordPress WebP Converter for Media < 4.0.3 - Unauthenticated Open Redirect
ID: CVE-2021-25074
Severity: medium
Author: dhiyaneshDk
Tags: cve2021,cve,redirect,wp-plugin,webpconverter,wpscan,wordpress,webp_converter_for_media_project
Description
Section titled “Description”WordPress WebP Converter for Media < 4.0.3 contains a file (passthru.php) which does not validate the src parameter before redirecting the user to it, leading to an open redirect issue.
YAML Source
Section titled “YAML Source”id: CVE-2021-25074
info: name: WordPress WebP Converter for Media < 4.0.3 - Unauthenticated Open Redirect author: dhiyaneshDk severity: medium description: WordPress WebP Converter for Media < 4.0.3 contains a file (passthru.php) which does not validate the src parameter before redirecting the user to it, leading to an open redirect issue. impact: | An attacker can trick users into visiting a malicious website, leading to potential phishing attacks or the disclosure of sensitive information. remediation: | Update to the latest version of the WordPress WebP Converter for Media plugin (4.0.3) or remove the plugin if not needed. reference: - https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164 - https://nvd.nist.gov/vuln/detail/CVE-2021-25074 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-25074 cwe-id: CWE-601 epss-score: 0.00106 epss-percentile: 0.43227 cpe: cpe:2.3:a:webp_converter_for_media_project:webp_converter_for_media:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: webp_converter_for_media_project product: webp_converter_for_media framework: wordpress tags: cve2021,cve,redirect,wp-plugin,webpconverter,wpscan,wordpress,webp_converter_for_media_project
http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/webp-converter-for-media/includes/passthru.php?src=https://interact.sh"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1# digest: 4b0a00483046022100d75cf733d19db34310d386f768132748bc5f7d2f9fbc19a69778a70018dcc212022100a397a722347191b390c96e701a204c28545d4a5142c984eede56867f2144cd19:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-25074.yaml"