WordPress Plugin Vulnerabilities
User Registration & Membership < 5.1.5 - Unauthenticated Open Redirect via 'redirect_to_on_logout' Parameter
Description
The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The `redirect_to_on_logout` GET parameter is passed directly to WordPress's `wp_redirect()` function instead of the domain-restricted `wp_safe_redirect()`. While `esc_url_raw()` is applied to sanitize malformed URLs, it does not restrict the redirect destination to the local domain, allowing an attacker to craft a specially formed link that redirects users to potentially malicious external URLs after logout, which could be used to facilitate phishing attacks.
Affects Plugins
References
Classification
Type
REDIRECT
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Louis Deschanel (JeanJeanLeHaxor), Pascal SUN, Anthony Cihan (Hann1bl3L3ct3r)
Verified
No
WPVDB ID
Timeline
Publicly Published
2026-04-13 (about 1 month ago)
Added
2026-04-13 (about 1 month ago)
Last Updated
2026-04-21 (about 21 days ago)