CrowdSec
8/10CrowdSec Score

Rank Math Plugin - Redirect Creation (CVE-2020-11515)

Published on07-04-2020
First seen on25-09-2025
CVSS 6.1/10Rank Math - SEO

86Exploiting IPs reported

The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI).

CrowdSec analysis

CVE-2020-11515 is a vulnerability in the Rank Math plugin for WordPress (up to version 1.0.40.2) that allows unauthenticated remote attackers to create arbitrary redirect URIs via an insecure REST API endpoint. This flaw can be exploited to craft malicious links that redirect users to external sites, potentially facilitating phishing attacks or traffic redirection schemes.

CrowdSec has been tracking this vulnerability and its exploits since 24th of September 2025.

Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2020-11515 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2020-11515 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2020-11515 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit the unprotected /wp-json/rankmath/v1/updateRedirection REST API endpoint to create arbitrary redirection URIs on vulnerable WordPress sites. This allows unauthenticated requests to set up redirects to attacker-controlled external websites.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.