Rank Math Plugin - Redirect Creation (CVE-2020-11515)
101Exploiting IPs reported
The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI).
CrowdSec analysis
CVE-2020-11515 is a vulnerability in the Rank Math plugin for WordPress (up to version 1.0.40.2) that allows unauthenticated remote attackers to create arbitrary redirect URIs via an insecure REST API endpoint. This flaw can be exploited to craft malicious links that redirect users to external sites, potentially facilitating phishing attacks or traffic redirection schemes.
CrowdSec has been tracking this vulnerability and its exploits since 24th of September 2025.
CrowdSec network observations suggest that most exploitation of CVE-2020-11515 involves focused reconnaissance to identify viable targets. Attackers typically tailor their campaigns based on system exposure and configuration. It is unlikely that a given attack is accidental. In addition, according to the CrowdSec network, attack volume against CVE-2020-11515 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.
Attackers exploit the unprotected /wp-json/rankmath/v1/updateRedirection REST API endpoint to create arbitrary redirection URIs on vulnerable WordPress sites. This allows unauthenticated requests to set up redirects to attacker-controlled external websites.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.