CVE-2025-30953

4.7 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in the WP Gravity Forms Salesforce plugin for WordPress. Attackers can craft malicious URLs that redirect users to phishing sites when they click on legitimate-looking links. This affects all WordPress sites using the vulnerable plugin versions.

💻 Affected Systems

Products:
  • WP Gravity Forms Salesforce (CRM Perks)
Versions: n/a through 1.4.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that steal credentials, financial information, or install malware, leading to account compromise and data breaches.

🟠

Likely Case

Attackers use the vulnerability in phishing campaigns to redirect users to fake login pages or malicious sites, potentially harvesting credentials or spreading malware.

🟢

If Mitigated

With proper user education and security controls, users recognize suspicious URLs and avoid clicking, limiting the impact to failed phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Open redirect vulnerabilities are commonly exploited in phishing campaigns. No authentication required to trigger the redirect.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.8 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/gf-salesforce-crmperks/vulnerability/wordpress-wp-gravity-forms-salesforce-1-4-7-open-redirection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Gravity Forms Salesforce' and check if update is available. 4. Click 'Update Now' to install version 1.4.8 or later. 5. Verify the plugin is active and functioning.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the WP Gravity Forms Salesforce plugin until patched

wp plugin deactivate gf-salesforce-crmperks

Implement URL validation

all

Add server-side validation to reject redirects to external domains

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block open redirect patterns
  • Educate users about phishing risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP Gravity Forms Salesforce version

Check Version:

wp plugin get gf-salesforce-crmperks --field=version

Verify Fix Applied:

Verify plugin version is 1.4.8 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP 302 redirects to external domains from plugin endpoints
  • Unusual redirect patterns in access logs

Network Indicators:

  • Redirects containing external URLs in Location headers from plugin URLs

SIEM Query:

source="web_server" http_status=302 url="*gf-salesforce*" location="*http*" NOT location="*yourdomain.com*"

🔗 References

📤 Share & Export