CVE-2025-1488
WPO365 | MICROSOFT 365 GRAPH MAILER <= 3.2 - Open Redirect via 'redirect_to' Parameter
CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th
The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.
| CWE | CWE-601 |
| Vendor | wpo365 |
| Product | wpo365 | microsoft 365 graph mailer |
| Published | Feb 24, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for wpo365 wpo365 | microsoft 365 graph mailer
Be the first to know when new medium vulnerabilities affecting wpo365 wpo365 | microsoft 365 graph mailer are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
wpo365 / WPO365 | MICROSOFT 365 GRAPH MAILER
0 โค 3.2
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/3a1782c3-ae0b-42f1-aa5e-dabfa2a5bbcd?source=cve wordpress.org: https://wordpress.org/plugins/wpo365-msgraphmailer/#developers wpo365.com: https://www.wpo365.com/change-log/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3244747/
Credits
Krzysztof Zajฤ
c