Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Galaxy Weblinks WP Clone any post type wp-clone-any-post-type allows Phishing.This issue affects WP Clone any post type: from n/a through <= 3.6.
Published: 2025-04-01
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WP Clone any post type plugin (Galaxy Weblinks) contains an Open Redirect flaw (CWE‑601) that allows an attacker to engineer URLs which redirect visitors to arbitrary third‑party sites. When a user follows such a link, they may be taken to a phishing or malware site, compromising user trust and potentially facilitating credential theft. The vulnerability does not provide direct code execution or data exposure, but the manipulation of user navigation creates a vector for social‑engineering attacks.

Affected Systems

This vulnerability affects the WP Clone any post type plugin for WordPress versions from the initial release through and including 3.6. The affected product is identical to the one distributed by Galaxy Weblinks on the WordPress plugin repository.

Risk and Exploitability

The CVSS score of 4.7 indicates moderate overall risk, while the EPSS score of less than 1 % reflects a low likelihood of exploitation at present. The flaw is not listed in CISA’s KEV catalog. An attacker can exploit the issue by supplying a crafted URL to the plugin that triggers an out‑of‑band HTTP redirect—any user who follows the link is exposed. No special credentials or elevated privileges are required, and the attack vector is most likely via a malicious link or embedded content shared through email, social media, or other publicly accessible channels.

Generated by OpenCVE AI on May 1, 2026 at 11:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP Clone any post type to the latest available release; the CVE description does not specify whether the update addresses the redirect issue, so the impact of the update on the vulnerability is uncertain.
  • If an update is not possible immediately, deactivate or uninstall the plugin to eliminate the attack surface.
  • Employ a web‑application firewall or security plugin to block or sanitize outbound redirects, ensuring that only trusted internal URLs are allowed.

Generated by OpenCVE AI on May 1, 2026 at 11:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9147 URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Galaxy Weblinks WP Clone any post type allows Phishing. This issue affects WP Clone any post type: from n/a through 3.4.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Galaxy Weblinks WP Clone any post type allows Phishing. This issue affects WP Clone any post type: from n/a through 3.4. URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Galaxy Weblinks WP Clone any post type wp-clone-any-post-type allows Phishing.This issue affects WP Clone any post type: from n/a through <= 3.6.
Title WordPress WP Clone any post type Plugin <= 3.4 - Open Redirect vulnerability WordPress WP Clone any post type Plugin <= 3.6 - Open Redirect vulnerability
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}


Tue, 01 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 15:00:00 +0000

Type Values Removed Values Added
Description URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Galaxy Weblinks WP Clone any post type allows Phishing. This issue affects WP Clone any post type: from n/a through 3.4.
Title WordPress WP Clone any post type Plugin <= 3.4 - Open Redirect vulnerability
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:14.804Z

Reserved: 2025-04-01T13:21:14.641Z

Link: CVE-2025-31871

cve-icon Vulnrichment

Updated: 2025-04-01T15:44:46.540Z

cve-icon NVD

Status : Deferred

Published: 2025-04-01T15:16:29.427

Modified: 2026-04-23T15:28:27.493

Link: CVE-2025-31871

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T11:45:16Z

Weaknesses