WordPress Plugin Vulnerabilities

User Registration & Membership < 5.1.5 - Unauthenticated Open Redirect via 'redirect_to_on_logout' Parameter

Description

The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The `redirect_to_on_logout` GET parameter is passed directly to WordPress's `wp_redirect()` function instead of the domain-restricted `wp_safe_redirect()`. While `esc_url_raw()` is applied to sanitize malformed URLs, it does not restrict the redirect destination to the local domain, allowing an attacker to craft a specially formed link that redirects users to potentially malicious external URLs after logout, which could be used to facilitate phishing attacks.

Affects Plugins

Fixed in 5.1.5

References

Classification

Type
REDIRECT
OWASP top 10
CWE

Miscellaneous

Original Researcher
Louis Deschanel (JeanJeanLeHaxor), Pascal SUN, Anthony Cihan (Hann1bl3L3ct3r)
Verified
No

Timeline

Publicly Published
2026-04-13 (about 1 month ago)
Added
2026-04-13 (about 1 month ago)
Last Updated
2026-04-21 (about 21 days ago)

Other