Description
The URL Shortify plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.12.1 due to insufficient validation on the 'redirect_to' parameter in the promotional dismissal handler. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites via a crafted link.
Published: 2026-02-18
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open redirect enabling unauthenticated redirection to malicious sites
Action: Patch plugin
AI Analysis

Impact

The URL Shortify plugin for WordPress is vulnerable to an open redirect flaw present in all releases up to and including 1.12.1. The flaw stems from insufficient validation on the redirect_to parameter used in the promotional dismissal handler, allowing an attacker to craft a link that will cause any user who clicks it to be redirected to an arbitrary URL, which can be leveraged for phishing, drive‑by downloads, or other malicious activities. The vulnerability does not provide code execution or data exfiltration, but it can be used as a vector for social engineering attacks or to siphon traffic to attacker-controlled sites.

Affected Systems

Any WordPress site that has installed the Kaizencoders URL Shortify plugin with version 1.12.1 or earlier is affected. The plugin versioning is listed up to 1.12.1, and the vulnerability resides in core code handling promotional banner dismissal.

Risk and Exploitability

The CVSS base score of 4.7 indicates a moderate severity, while the EPSS score of less than 1 % suggests a low likelihood of mass exploitation for the time being. It is not referenced in CISA’s Known Exploited Vulnerabilities catalog, further indicating limited known use. Attackers can exploit this flaw by constructing a malicious URL that contains the unvalidated redirect_to parameter; a victim clicking the link will be redirected after dismissing the banner. No authentication or additional privileges are required.

Generated by OpenCVE AI on April 15, 2026 at 18:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the URL Shortify plugin to a version newer than 1.12.1 where the redirect_to parameter has been removed or validated.
  • If an upgrade cannot be performed immediately, disable or remove the promotional dismissal functionality that uses the redirect_to parameter, or modify the plugin code to strip the parameter before use.
  • Deploy a web application firewall rule that filters or sanitizes the redirect_to query string, blocking arbitrary redirects from untrusted sources.

Generated by OpenCVE AI on April 15, 2026 at 18:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Kaizencoders
Kaizencoders url Shortify – Simple And Easy Url Shortener
Wordpress
Wordpress wordpress
Vendors & Products Kaizencoders
Kaizencoders url Shortify – Simple And Easy Url Shortener
Wordpress
Wordpress wordpress

Wed, 18 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description The URL Shortify plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.12.1 due to insufficient validation on the 'redirect_to' parameter in the promotional dismissal handler. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites via a crafted link.
Title URL Shortify <= 1.12.1 - Unauthenticated Open Redirect via 'redirect_to' Parameter
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}


Subscriptions

Kaizencoders Url Shortify – Simple And Easy Url Shortener
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:28.282Z

Reserved: 2026-01-20T22:04:30.416Z

Link: CVE-2026-1277

cve-icon Vulnrichment

Updated: 2026-02-18T20:29:23.097Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T05:16:24.960

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1277

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:30:10Z

Weaknesses