CrowdSec
6/10CrowdSec Score

Rank Math Plugin - Redirect Creation (CVE-2020-11515)

Published on07-04-2020
First seen on25-09-2025
Public ExploitCVSS 6.1/10Rank Math - SEO

101Exploiting IPs reported

The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI).

CrowdSec analysis

CVE-2020-11515 is a vulnerability in the Rank Math plugin for WordPress (up to version 1.0.40.2) that allows unauthenticated remote attackers to create arbitrary redirect URIs via an insecure REST API endpoint. This flaw can be exploited to craft malicious links that redirect users to external sites, potentially facilitating phishing attacks or traffic redirection schemes.

CrowdSec has been tracking this vulnerability and its exploits since 24th of September 2025.

CrowdSec network observations suggest that most exploitation of CVE-2020-11515 involves focused reconnaissance to identify viable targets. Attackers typically tailor their campaigns based on system exposure and configuration. It is unlikely that a given attack is accidental. In addition, according to the CrowdSec network, attack volume against CVE-2020-11515 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.

Attackers exploit the unprotected /wp-json/rankmath/v1/updateRedirection REST API endpoint to create arbitrary redirection URIs on vulnerable WordPress sites. This allows unauthenticated requests to set up redirects to attacker-controlled external websites.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.