Skip to content

Analytics Insights for Google Analytics 4 < 6.3 - Open Redirect

ID: CVE-2024-0250

Severity: medium

Author: s4e-io

Tags: cve,cve2024,wpscan,redirect,wp,wp-plugin,wordpress,analytics-insights

The plugin is vulnerable to Open Redirect due to insufficient validation on the redirect oauth2callback.php file. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.

id: CVE-2024-0250
info:
name: Analytics Insights for Google Analytics 4 < 6.3 - Open Redirect
author: s4e-io
severity: medium
description: |
The plugin is vulnerable to Open Redirect due to insufficient validation on the redirect oauth2callback.php file. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
remediation: |
Fixed in 6.3
reference:
- https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://nvd.nist.gov/vuln/detail/CVE-2024-0250
classification:
epss-score: 0.00043
epss-percentile: 0.0866
metadata:
max-request: 1
verified: true
fofa-query: body="/wp-content/plugins/analytics-insights"
publicwww-query: "/wp-content/plugins/analytics-insights"
tags: cve,cve2024,wpscan,redirect,wp,wp-plugin,wordpress,analytics-insights
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/analytics-insights/tools/oauth2callback.php?state=https://oast.me/%3f&code=x"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$'
# digest: 490a0046304402203c489f7c519da6b618fee56bcde8cab24fe22a36fd7c2a938a00909181deefeb02202f0dfab66612e03b93e59ab692b3f75cd8afca5d86a8bc6d776c491ce6b14faf:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-0250.yaml"

View on Github