VYPR
Medium severity6.1NVD Advisory· Published Apr 13, 2026· Updated Apr 22, 2026

CVE-2026-6203

CVE-2026-6203

Description

The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The redirect_to_on_logout GET parameter is passed directly to WordPress's wp_redirect() function instead of the domain-restricted wp_safe_redirect(). While esc_url_raw() is applied to sanitize malformed URLs, it does not restrict the redirect destination to the local domain, allowing an attacker to craft a specially formed link that redirects users to potentially malicious external URLs after logout, which could be used to facilitate phishing attacks.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

5