vulnerability
WordPress Plugin: wpdirectorykit: CVE-2023-31229: URL Redirection to Untrusted Site ('Open Redirect')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Apr 27, 2023 | May 15, 2025 | Apr 30, 2026 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Apr 27, 2023
Added
May 15, 2025
Modified
Apr 30, 2026
Description
The WP Directory Kit plugin for WordPress is vulnerable to Open Redirect in versions up to, and including, 1.1.9. This is due to insufficient validation on the redirect url supplied via the redirect_url parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
Solution
wpdirectorykit-plugin-cve-2023-31229
References
- https://www.cve.org/CVERecord?id=CVE-2023-31229
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0f01ee24-544b-45cb-9cf3-7db8263d8e54?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-35544
- CVE-2023-31229
- https://attackerkb.com/topics/CVE-2023-31229
- CWE-601
- EUVD-EUVD-2023-35544
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.