WordPress unsafe redirect for login

By
Jijith Rajan
Published on
26 Jun 2018

Open Redirect is a vulnerability by which a web application fails to authenticate URLs. This will lead to attackers directing the end users to malicious sites to extract information. The older versions of WordPress had redirection loop vulnerability. If the WordPress is forced to redirect to HTTPS, the server will cause redirection loop in the login page. The best way to fix this vulnerability is to Force Secure Sockets Layer Login as true. Force Secure Sockets Layer Admin is set as true by default in old WordPress version.

Example

        <?php
        wp_safe_redirect( $location, $status );
        exit;
        ?>

    

Impact

The impact include:-

  • The attacker can steal information from end-users
  • The attacker can persue the end-user into downloading malicious files

Impact and Fixes

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Jijith Rajan
Jijith Rajan
Cyber Security Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.