CVE-2023-45105

affiliate-toolkit – WordPress Affiliate Plugin <= 3.3.9 - Open Redirect via atkpout.php

lowURL Redirection to Untrusted Site ('Open Redirect')
3.4
CVSS Score
3.4
CVSS Score
low
Severity
3.4.0
Patched in
109d
Time to patch

Description

The affiliate-toolkit – WordPress Affiliate Plugin is vulnerable to Open Redirect in versions up to, and including, 3.3.9. This is due to insufficient validation on the redirect url supplied via the 'url' parameter in atkpout.php. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action. Only sites that do not have a atkp-imagereceiver-key.php setup are vulnerable, as the attacker must calculate the md5 hash of the URL combined with the key from that file in order to successfully redirect victims. If atkp-imagereceiver-key.php is not present, the md5 hash of atkpout.php, which is publicly available, will be used, allowing redirection.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
None
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<=3.3.9
PublishedOctober 6, 2023
Last updatedJanuary 22, 2024

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.