Impact
This vulnerability allows an attacker to force a LearnPress powered WordPress site to redirect a user to any external URL chosen by the attacker. The flaw arises because the plugin does not validate the redirect target, making it possible to embed malicious URLs in links or forms. This feature can be abused for phishing or social‑engineering attacks, compromising user trust and potentially facilitating credential theft.
Affected Systems
The affected product is the ThimPress LearnPress plugin for WordPress. All installations running version 4.2.7.1 or earlier are vulnerable. WordPress sites that rely on this plugin and expose the redirect functionality to users are at risk.
Risk and Exploitability
The CVSS score of 4.7 indicates a moderate severity. The EPSS score of less than 1% suggests a low likelihood of widespread exploitation at this time. The vulnerability is not listed in the CISA KEV catalog, reflecting limited observed exploitation. The attack is likely to occur via a web-based redirect exploit, where the attacker directs a legitimate user to a malicious site through a crafted URL or embedded link. Based on the description, it is inferred that the exploit requires an end‑user visiting a crafted link.
OpenCVE Enrichment
EUVD