CVE-2025-54681

4.7 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in the CRM Perks Connector for Gravity Forms and Google Sheets WordPress plugin. Attackers can craft malicious URLs that redirect users to phishing sites when they click legitimate-looking links. WordPress sites using affected plugin versions are vulnerable.

💻 Affected Systems

Products:
  • CRM Perks Connector for Gravity Forms and Google Sheets WordPress plugin
Versions: n/a through 1.2.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to convincing phishing sites that steal credentials, payment information, or install malware, leading to account compromise and data breaches.

🟠

Likely Case

Attackers use the vulnerability in phishing campaigns to redirect users to fake login pages, harvesting credentials for the affected WordPress site or other services.

🟢

If Mitigated

With proper web application firewalls and user education about suspicious links, impact is limited to failed phishing attempts with minimal damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious URLs with redirect parameters, but no authentication is needed to trigger the redirect.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.2.4

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-gravity-forms-spreadsheets/vulnerability/wordpress-connector-for-gravity-forms-and-google-sheets-plugin-plugin-1-2-4-open-redirection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Connector for Gravity Forms and Google Sheets'. 4. Click 'Update Now' if available, or manually update to latest version. 5. Verify plugin is updated to version after 1.2.4.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched version is available

Web Application Firewall rule

all

Block redirects to external domains from the plugin's endpoints

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict redirects
  • Deploy web application firewall with open redirect protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Connector for Gravity Forms and Google Sheets' version

Check Version:

wp plugin list --name='connector-for-gravity-forms-and-google-sheets' --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.2.4 in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • HTTP 302 redirects from plugin endpoints to external domains
  • Unusual referrer patterns in access logs

Network Indicators:

  • Redirects containing suspicious URL parameters
  • Traffic to known phishing domains

SIEM Query:

source="web_logs" url="*redirect=*" AND url="*http*" AND NOT url="*yourdomain.com*"

🔗 References

📤 Share & Export