First published: Sat Mar 01 2025(Updated: )
The IP2Location Redirection plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'download_ip2location_redirection_backup' AJAX action in all versions up to, and including, 1.33.3. This makes it possible for unauthenticated attackers to download the plugin's settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
IP2Location Redirection | <=1.33.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1502 is classified as a medium severity vulnerability due to unauthorized access risks it poses.
CVE-2025-1502 allows unauthorized users to access sensitive data through a missing capability check in the plugin.
To fix CVE-2025-1502, update the IP2Location Redirection plugin to version 1.33.4 or later.
All versions of the IP2Location Redirection plugin up to and including 1.33.3 are affected by CVE-2025-1502.
Users of the IP2Location Redirection plugin running vulnerable versions are at risk due to unauthorized data access.