Skip to content
  • Solutions
    By Role
    • For Developers
    • For Content Managers
    • For Agencies
    • For IT Admins
    • For Web Hosters
    • For Developers
    • For Content Managers
    • For Agencies
    • For IT Admins
    • For Web Hosters
    By Infrastructure
    • Overview
    • AWS
    • Microsoft Azure
    • Alibaba Cloud
    • Google Cloud Platform
    • Vultr
    • Overview
    • AWS
    • Microsoft Azure
    • Alibaba Cloud
    • Google Cloud Platform
    • Vultr
    • Digital Ocean
    • Linode
    • Upcloud
    • Oracle
    • OVH
    • Digital Ocean
    • Linode
    • Upcloud
    • Oracle
    • OVH
  • Product
    • Plesk Features
    • Plesk Editions
    • What’s new
    • Pricing
    • Roadmap
    • Lifecycle Policy
    • Extensions Catalogue
  • Pricing
  • Extensions
    Featured Extensions
    • SocialBee
    • WP Toolkit
    • Sitejet Builder for Plesk
    • SEO Toolkit
    • Joomla! Toolkit
    • Premium Email
    • Email Security
    • SocialBee
    • WP Toolkit
    • Sitejet Builder for Plesk
    • SEO Toolkit
    • Joomla! Toolkit
    • Premium Email
    • Email Security
    Bundles and packs:
    • Business and Collaboration Edition
    • WP pack
    • Hosting pack
    • Power pack
    • Language pack
    • Business and Collaboration Edition
    • WP pack
    • Hosting pack
    • Power pack
    • Language pack

    See all Extensions

  • For Partners
    • Plesk Contributor Program
    • Plesk Partner Program
    • Affiliate program
    • Plesk University
  • Help Center
    • Documentation
    • Professional Services
    • Support
    • Contact Us
    • Wiki
    • Forum
  • Plesk 360 login
  • Free Trial
  • Pricing
  • Solutions
    • By Role
      • For Developers
      • For Content Managers
      • For Agencies
      • For IT Admins
      • For Web Hosters
    • By Infrastructure
      • Overview
      • Plesk on Amazon Web Services (AWS & Lightsail)
      • Microsoft Azure
      • Alibaba Cloud
      • Google Cloud Platform
      • Vultr
      • DigitalOcean
      • Linode
      • UpCloud
      • Oracle
      • OVH
  • Products
  • Pricing
  • Extensions
    • Featured Extensions
      • SocialBee
      • WP Toolkit
      • Sitejet Builder for Plesk
      • SEO Toolkit
      • Joomla! Toolkit
      • Premium Email
      • Email Security
    • Bundles and packs:
      • Business and Collaboration Edition
      • WP pack
      • Hosting pack
      • Power pack
      • Language pack
      • See all Extensions
  • For Partners
    • Plesk Contributor Program
    • Plesk Partner Program
    • Affiliate Program
    • Plesk University
  • Help Center
    • Documentation
    • Professional Services
    • Support
    • Contact Us
    • Wiki
    • Forum
  • Plesk 360 login
  • Free Trial
  • Pricing
  • Solutions
    • By Role
      • For Developers
      • For Content Managers
      • For Agencies
      • For IT Admins
      • For Web Hosters
    • By Infrastructure
      • Overview
      • Plesk on Amazon Web Services (AWS & Lightsail)
      • Microsoft Azure
      • Alibaba Cloud
      • Google Cloud Platform
      • Vultr
      • DigitalOcean
      • Linode
      • UpCloud
      • Oracle
      • OVH
  • Products
  • Pricing
  • Extensions
    • Featured Extensions
      • SocialBee
      • WP Toolkit
      • Sitejet Builder for Plesk
      • SEO Toolkit
      • Joomla! Toolkit
      • Premium Email
      • Email Security
    • Bundles and packs:
      • Business and Collaboration Edition
      • WP pack
      • Hosting pack
      • Power pack
      • Language pack
      • See all Extensions
  • For Partners
    • Plesk Contributor Program
    • Plesk Partner Program
    • Affiliate Program
    • Plesk University
  • Help Center
    • Documentation
    • Professional Services
    • Support
    • Contact Us
    • Wiki
    • Forum
  • Plesk 360 login
  • Free Trial
Plesk 360 login
Free Trial

Knowledge Base

Protecting Against Open Redirect

 
administrator guideplesk administrationsecuring pleskdomain nameip

Open redirect (also known as unvalidated redirects and
forwards)

is a URL redirection vulnerability. An attacker can exploit it to
redirect users from a trusted to a potentially malicious third-party
website and steal their credentials via a phishing attack. To protect
against this vulnerability, we recommend configuring Plesk to restrict
URL redirection.

The vulnerability is made possible by the failure_redirect_url
parameter, which is used when you set up automated logging in to
Plesk
.
This parameter contains one or more hostnames to which a user is
redirected after performing a failed login attempt or logging out.

The vulnerability affects all Plesk servers, regardless of whether
automatic logging in to Plesk has been set up or not. To protect against
it, you need to add an entry to the panel.ini file. The
exact entry varies depending on whether automatic logging in to Plesk
has been set up.

To protect Plesk against open redirect if you have not set up
automatic logging in to Plesk:

Add the following lines to the panel.ini file:

[security]
trustedRedirectHosts =

The trustedRedirectHosts line is empty and no hosts are specified.
This way you forbid Plesk from redirecting to any hosts using the
failure_redirect_url parameter.

To protect Plesk against open redirect if you have set up automatic
logging in to Plesk:

Add an entry to the panel.ini file according to the
following pattern:

[security]
trustedRedirectHosts = hostname

Where hostname is a trustworthy host to which URL redirection via
the failure_redirect_url parameter will be allowed.

The trustedRedirectHosts setting accepts one or more hostnames
separated by commas and specified in the following format:

  • A domain name, for example example.com
  • An IP address, for example 10.58.58.100
  • Wildcard subdomains, for example *.example.com

Note: When specifying hostnames in trustedRedirectHosts and
failure_redirect_url, only use the asterisk (*) character
following the pattern shown above (*.example.com). Otherwise,
your server may remain vulnerable. For example, the hostnames
example.* or 203.0.113.* are insecure as they can match
example.maliciouswebsite.com and
203.0.113.maliciouswebsite.com, respectively.

Here is a valid example of the trustedRedirectHosts setting in the
panel.ini file:

[security]
trustedRedirectHosts = example.com,10.58.58.100,*.example.com

Where example.com, 10.58.58.100, *.example.com are
hostnames used in the failure_redirect_url parameter.

Note: When specifying several hostnames in trustedRedirectHosts, do not
add the whitespace ( ) character before or after the comma (,) that
separates hostnames. Otherwise, the hostname will not be handled
correctly and URL redirection will fail.

Tweet
Share
Share
Email
0 Shares
Read the full article
Related Posts

Full Site Check now scans for Google Fonts

Read More »

Server Management: IP Mapping Guideline

Read More »

Configuring DNS For A Domain With Plesk

Read More »
Knowledge Base

IIS Web Server Settings – Directory Security Settings

Read More »

Optimizing Apache Web Server – Setting Up the Apache Restart Interval

Read More »

Event Parameters Passed by Event Handlers – Server health status changed

Read More »

Event Parameters Passed by Event Handlers – SSL/TLS certificate on mail server assigned/unassigned

Read More »

Hosting Wiki

  • Content Security Policy ( CSP )
  • Server Redundancy
  • Bare Metal Server
  • Oracle VM Server
  • Server Virtualization Software
  • Windows Server
  • JavaScript
  • Subdomain
  • Domain
  • Plesk
  • Web Server
  • DNS Server
  • IPv6
  • IPv4
  • SIP
  • UDP/IP
  • URL
  • TCP/IP
X-twitter Linkedin Youtube Reddit Github
  • Product
  • Login
  • Pricing
  • Editions
  • For Partners
  • Partner Program
  • Contributor Program
  • Affiliate Program
  • Plesk University
  • Company
  • Blog
  • Careers
  • Events
  • About Plesk
  • Our Brand
  • Resources
  • User and Admin guides
  • Help Center
  • Migrate to Plesk
  • Contact Us
  • Hosting Wiki
  • Forum
  • Legal
  • Legal
  • Privacy Policy
  • Imprint

© 2025 WebPros International GmbH

Part of the WebPros®  Family