Rank Math Plugin - Redirect Creation (CVE-2020-11515)
86Exploiting IPs reported
The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI).
CrowdSec analysis
CVE-2020-11515 is a vulnerability in the Rank Math plugin for WordPress (up to version 1.0.40.2) that allows unauthenticated remote attackers to create arbitrary redirect URIs via an insecure REST API endpoint. This flaw can be exploited to craft malicious links that redirect users to external sites, potentially facilitating phishing attacks or traffic redirection schemes.
CrowdSec has been tracking this vulnerability and its exploits since 24th of September 2025.
Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2020-11515 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2020-11515 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2020-11515 is currently experiencing high visibility and active exploitation across the internet.
Attackers exploit the unprotected /wp-json/rankmath/v1/updateRedirection
REST API endpoint to create arbitrary redirection URIs on vulnerable WordPress sites. This allows unauthenticated requests to set up redirects to attacker-controlled external websites.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.