CVE-2023-46750: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Apache Software Foundation Apache Shiro
URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.
AI Analysis
Technical Summary
CVE-2023-46750 is classified as a CWE-601 Open Redirect vulnerability found in the Apache Shiro framework, specifically when form-based authentication is enabled. Apache Shiro is a widely used Java security framework that provides authentication, authorization, cryptography, and session management. The vulnerability arises because the framework improperly validates redirect URLs after authentication, allowing an attacker to manipulate the redirect parameter to point to an untrusted external site. This can be exploited by crafting malicious URLs that, when clicked by a user, redirect them to phishing or malicious websites. The vulnerability affects all versions of Apache Shiro prior to 1.13.0 and 2.0.0-alpha-4, including early alpha releases. The CVSS 3.1 base score is 4.7, reflecting a medium severity level due to the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact is primarily on confidentiality, as users may be tricked into divulging credentials or sensitive data on attacker-controlled sites. Integrity and availability are not directly affected. No known exploits have been reported in the wild as of the publication date (December 14, 2023). The recommended mitigation is to upgrade Apache Shiro to version 1.13.0 or later, or 2.0.0-alpha-4 or later, where the redirect validation logic has been corrected to prevent open redirects.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks facilitated by open redirects. Attackers can exploit this flaw to redirect authenticated users to malicious sites that mimic legitimate services, potentially harvesting credentials or delivering malware. This can undermine user trust and lead to data breaches or account compromise. Organizations with customer-facing web applications or internal portals using vulnerable Apache Shiro versions are at risk. The vulnerability does not directly compromise system integrity or availability but can be a stepping stone for more sophisticated attacks. The impact is heightened in sectors with sensitive data such as finance, healthcare, and government services. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection, so exploitation leading to data leakage could result in legal and financial penalties.
Mitigation Recommendations
The primary mitigation is to upgrade Apache Shiro to version 1.13.0 or later, or 2.0.0-alpha-4 or later, where the open redirect vulnerability has been fixed. Organizations should audit their applications to identify usage of vulnerable Shiro versions, especially those employing form-based authentication. Implement strict validation and sanitization of redirect URLs on the server side to ensure they only point to trusted internal domains. Employ Content Security Policy (CSP) headers to reduce the risk of redirection-based attacks. Educate users and administrators about phishing risks associated with open redirects. Monitor web traffic for suspicious redirect patterns and consider deploying web application firewalls (WAFs) with rules targeting open redirect attempts. Finally, integrate this vulnerability into vulnerability management and patching cycles to ensure timely updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2023-46750: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Apache Software Foundation Apache Shiro
Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.
AI-Powered Analysis
Technical Analysis
CVE-2023-46750 is classified as a CWE-601 Open Redirect vulnerability found in the Apache Shiro framework, specifically when form-based authentication is enabled. Apache Shiro is a widely used Java security framework that provides authentication, authorization, cryptography, and session management. The vulnerability arises because the framework improperly validates redirect URLs after authentication, allowing an attacker to manipulate the redirect parameter to point to an untrusted external site. This can be exploited by crafting malicious URLs that, when clicked by a user, redirect them to phishing or malicious websites. The vulnerability affects all versions of Apache Shiro prior to 1.13.0 and 2.0.0-alpha-4, including early alpha releases. The CVSS 3.1 base score is 4.7, reflecting a medium severity level due to the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact is primarily on confidentiality, as users may be tricked into divulging credentials or sensitive data on attacker-controlled sites. Integrity and availability are not directly affected. No known exploits have been reported in the wild as of the publication date (December 14, 2023). The recommended mitigation is to upgrade Apache Shiro to version 1.13.0 or later, or 2.0.0-alpha-4 or later, where the redirect validation logic has been corrected to prevent open redirects.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks facilitated by open redirects. Attackers can exploit this flaw to redirect authenticated users to malicious sites that mimic legitimate services, potentially harvesting credentials or delivering malware. This can undermine user trust and lead to data breaches or account compromise. Organizations with customer-facing web applications or internal portals using vulnerable Apache Shiro versions are at risk. The vulnerability does not directly compromise system integrity or availability but can be a stepping stone for more sophisticated attacks. The impact is heightened in sectors with sensitive data such as finance, healthcare, and government services. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection, so exploitation leading to data leakage could result in legal and financial penalties.
Mitigation Recommendations
The primary mitigation is to upgrade Apache Shiro to version 1.13.0 or later, or 2.0.0-alpha-4 or later, where the open redirect vulnerability has been fixed. Organizations should audit their applications to identify usage of vulnerable Shiro versions, especially those employing form-based authentication. Implement strict validation and sanitization of redirect URLs on the server side to ensure they only point to trusted internal domains. Employ Content Security Policy (CSP) headers to reduce the risk of redirection-based attacks. Educate users and administrators about phishing risks associated with open redirects. Monitor web traffic for suspicious redirect patterns and consider deploying web application firewalls (WAFs) with rules targeting open redirect attempts. Finally, integrate this vulnerability into vulnerability management and patching cycles to ensure timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2023-10-25T19:11:12.143Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f67ff0acd01a2492645a4
Added to database: 5/22/2025, 6:07:59 PM
Last enriched: 11/4/2025, 12:44:45 AM
Last updated: 12/3/2025, 3:01:50 PM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-53841: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Akamai Guardicore Platform Agent
HighCVE-2025-13949: Unrestricted Upload in ProudMuBai GoFilm
MediumCVE-2025-13948: Use of Hard-coded Cryptographic Key in opsre go-ldap-admin
MediumCVE-2025-13756: CWE-862 Missing Authorization in techjewel Fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
MediumCVE-2025-13401: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optimizingmatters Autoptimize
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.