CVE-2025-64250

MEDIUM
2025-12-16 [email protected]
6.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Dec 16, 2025 - 09:15 nvd
MEDIUM 6.1

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in wpWax Directorist directorist allows Phishing.This issue affects Directorist: from n/a through <= 8.6.6.

Analysis

Open redirect vulnerability in wpWax Directorist WordPress plugin versions up to 8.6.6 allows unauthenticated remote attackers to redirect users to arbitrary external websites via crafted URL parameters, enabling phishing attacks. The vulnerability requires user interaction (clicking a malicious link) but has a network attack vector with low complexity. EPSS exploitation probability is very low at 0.04%, and no active exploitation or public proof-of-concept has been identified.

Technical Context

This is a CWE-601 (URL Redirection to Untrusted Site) vulnerability inherent to improper input validation on URL redirect parameters within the Directorist plugin. The plugin likely uses user-supplied input directly in redirect functions without validating that the destination URL belongs to the trusted domain. Directorist is a WordPress directory listing plugin that handles user navigation and profile linking; if redirect logic in directory navigation, directory listing URLs, or user profile links fails to validate target domains, attackers can inject arbitrary external URLs. The vulnerability affects all versions from initial release through 8.6.6.

Affected Products

wpWax Directorist WordPress plugin versions from initial release through 8.6.6 are affected. The vulnerability was disclosed via Patchstack ([email protected]) and documented in their vulnerability database. Exact patched version information was not provided in available references, though Patchstack advisory suggests version tracking for this plugin.

Remediation

Update wpWax Directorist to the latest available version above 8.6.6 immediately. Consult the official Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/directorist/vulnerability/wordpress-directorist-plugin-8-5-6-open-redirection-vulnerability for patch availability and exact upgrade instructions. As a temporary mitigation, site administrators should implement strict Content Security Policy headers with frame-ancestors and redirect-uri restrictions, or use web application firewall rules to block redirect parameters pointing to external domains. Review any custom redirect implementations in child themes or custom code for similar URL validation gaps.

Priority Score

31
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +30
POC: 0

Share

CVE-2025-64250 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy