CVE-2025-60151

4.7 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in the WP Gravity Forms HubSpot plugin for WordPress. Attackers can craft malicious URLs that redirect users to phishing sites when they click links within affected forms. WordPress sites using this plugin version 1.2.5 or earlier are vulnerable.

💻 Affected Systems

Products:
  • WP Gravity Forms HubSpot (gf-hubspot)
Versions: <= 1.2.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to convincing phishing sites that steal credentials, payment information, or install malware, leading to account compromise and data theft.

🟠

Likely Case

Attackers use the redirect for phishing campaigns targeting site visitors, potentially compromising user accounts and spreading malware.

🟢

If Mitigated

With proper user education and browser security features, users might recognize suspicious redirects, limiting successful phishing attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (clicking a malicious link). No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 1.2.5

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/gf-hubspot/vulnerability/wordpress-wp-gravity-forms-hubspot-plugin-1-2-5-open-redirection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Gravity Forms HubSpot' and update to latest version. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate gf-hubspot

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block open redirect patterns.
  • Educate users about phishing risks and suspicious URLs.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for WP Gravity Forms HubSpot version.

Check Version:

wp plugin get gf-hubspot --field=version

Verify Fix Applied:

Confirm plugin version is > 1.2.5 in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirects in web server logs (e.g., 302 status codes to external domains)
  • Suspicious referrer URLs in access logs

Network Indicators:

  • HTTP redirects to unexpected external domains from plugin endpoints

SIEM Query:

web.status_code=302 AND url.path="/wp-content/plugins/gf-hubspot/*" AND NOT url.destination IN (allowed_domains)

🔗 References

📤 Share & Export