The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.
History

Thu, 27 Mar 2025 00:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:*:wpo365:microsoft_365_graph_mailer:*:*:*:*:*:*:*:* cpe:2.3:a:wpo365:microsoft_365_graph_mailer:*:*:*:*:*:*:*:*

Tue, 25 Mar 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Wpo365
Wpo365 microsoft 365 Graph Mailer
CPEs cpe:2.3:*:wpo365:microsoft_365_graph_mailer:*:*:*:*:*:*:*:*
Vendors & Products Wpo365
Wpo365 microsoft 365 Graph Mailer

Mon, 24 Feb 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Feb 2025 11:15:00 +0000

Type Values Removed Values Added
Description The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.
Title WPO365 | MICROSOFT 365 GRAPH MAILER <= 3.2 - Open Redirect via 'redirect_to' Parameter
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-24T12:47:14.566Z

Reserved: 2025-02-19T21:57:31.462Z

Link: CVE-2025-1488

cve-icon Vulnrichment

Updated: 2025-02-24T12:47:04.696Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-24T11:15:10.193

Modified: 2025-03-27T00:25:37.117

Link: CVE-2025-1488

cve-icon Redhat

No data.