Vulnerability Description
The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpo365 | Microsoft 365 Graph Mailer | <= 3.3 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3244747/Patch
- https://wordpress.org/plugins/wpo365-msgraphmailer/#developersRelease Notes
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3a1782c3-ae0b-42f1-aa5Third Party Advisory
- https://www.wpo365.com/change-log/Product
FAQ
What is CVE-2025-1488?
CVE-2025-1488 is a vulnerability with a CVSS score of 4.7 (MEDIUM). The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url suppli...
How severe is CVE-2025-1488?
CVE-2025-1488 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-1488?
Check the references section above for vendor advisories and patch information. Affected products include: Wpo365 Microsoft 365 Graph Mailer.