CVE-2025-5983
Description
The Meta Tag Manager WordPress plugin before 3.3 does not restrict which roles can create http-equiv refresh meta tags.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Meta Tag Manager plugin before 3.3 allows contributors and above to inject open redirect meta tags, enabling phishing attacks.
Vulnerability
Overview
The Meta Tag Manager WordPress plugin versions before 3.3 fail to restrict which user roles can create http-equiv="refresh" meta tags. This oversight allows authenticated users with at least Contributor-level access to inject arbitrary redirect URLs into posts or pages.
Exploitation
An attacker with a Contributor account or higher can add a meta refresh tag pointing to an external malicious site. No additional authentication or special privileges beyond the standard WordPress contributor role are needed. The vulnerability is triggered when a visitor loads the compromised page, which automatically redirects the browser to the attacker-controlled destination.
Impact
By leveraging this open redirect, an attacker can craft phishing campaigns that appear to originate from the legitimate WordPress site. Users may be tricked into visiting fake login pages or malicious downloads, increasing the risk of credential theft or malware infection. The CWE classification is CWE-601 (URL Redirection to Untrusted Site) [1], indicating a clear open redirect pattern.
Mitigation
The issue is fixed in version 3.3 of the Meta Tag Manager plugin. Site administrators should update immediately. The WPVDB entry notes the vulnerability was publicly disclosed on 2025-10-01 [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<3.3+ 1 more
- (no CPE)range: <3.3
- (no CPE)range: <3.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.