WordPress unsafe redirect for login

OWASP 2017-A1 OWASP 2017-A1 CWE-601 WASC-38

Open Redirect is a vulnerability by which a web application fails to authenticate URLs. This will lead to attackers directing the end users to malicious sites to extract information. The older versions of WordPress had redirection loop vulnerability. If the WordPress is forced to redirect to HTTPS, the server will cause redirection loop in the login page. The best way to fix this vulnerability is to Force Secure Sockets Layer Login as true. Force Secure Sockets Layer Admin is set as true by default in old WordPress version.

Example

        <?php
        wp_safe_redirect( $location, $status );
        exit;
        ?>

    

Impact

The impact include:-

  • The attacker can steal information from end-users
  • The attacker can persue the end-user into downloading malicious files

Impact and Fixes

Latest Articles