vulnerability
WordPress Plugin: woo-parcel-pro: CVE-2023-46624: URL Redirection to Untrusted Site ('Open Redirect')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Oct 25, 2023 | May 15, 2025 | Jun 24, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Oct 25, 2023
Added
May 15, 2025
Modified
Jun 24, 2025
Description
The Parcel Pro plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.6.11. This is due to insufficient validation on the redirect url supplied via the 'redirect' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
Solution
woo-parcel-pro-plugin-cve-2023-46624

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.