cve/2021/CVE-2021-25074.md

19 lines
930 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-25074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25074)
![](https://img.shields.io/static/v1?label=Product&message=WebP%20Converter%20for%20Media%20%E2%80%93%20Convert%20WebP%20and%20AVIF%20%26%20Optimize%20Images&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=4.0.3%3C%204.0.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brighgreen)
### Description
The WebP Converter for Media WordPress plugin before 4.0.3 contains a file (passthru.php) which does not validate the src parameter before redirecting the user to it, leading to an Open Redirect issue
### POC
#### Reference
- https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates