Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11190: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Synchroweb Kiwire

0
Medium
VulnerabilityCVE-2025-11190cvecve-2025-11190cwe-89
Published: Fri Oct 10 2025 (10/10/2025, 11:03:33 UTC)
Source: CVE Database V5
Vendor/Project: Synchroweb
Product: Kiwire

Description

The Kiwire Captive Portal contains an open redirection issue via the login-url parameter, allowing an attacker to redirect users to an attacker controlled website.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:19:16 UTC

Technical Analysis

CVE-2025-11190 identifies a vulnerability in Synchroweb's Kiwire Captive Portal version 3.6, specifically an open redirection issue via the login-url parameter. Open redirection occurs when an application accepts a user-controlled input that specifies a URL and redirects the user to that URL without sufficient validation. In this case, the login-url parameter can be manipulated by an attacker to redirect users to attacker-controlled websites. This vulnerability falls under CWE-89, which is generally associated with SQL Injection, but the description and details indicate the primary issue is open redirection rather than SQL Injection, suggesting a possible misclassification or multiple issues. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N) indicates the vulnerability is remotely exploitable over the network without privileges but requires user interaction. The impact on confidentiality and integrity is low, as the attacker can only redirect users but cannot directly access or modify data. Availability is not affected. The lack of patches and absence of known exploits in the wild suggest this is a newly disclosed vulnerability. The open redirection can be leveraged in phishing campaigns, where users are tricked into visiting malicious sites appearing legitimate due to the trusted captive portal domain. This can lead to credential theft, malware infection, or further social engineering attacks. The vulnerability affects only version 3.6 of Kiwire, a captive portal solution commonly used in public Wi-Fi networks to manage user access and authentication.

Potential Impact

For European organizations, especially those operating public Wi-Fi networks such as airports, hotels, cafes, and transportation hubs, this vulnerability poses a risk of facilitating phishing and social engineering attacks. Attackers can exploit the open redirection to lure users into malicious sites, potentially leading to credential compromise or malware infections. Although the vulnerability does not directly compromise the captive portal system's data or availability, the indirect consequences can be severe, including reputational damage and loss of user trust. Organizations relying on Kiwire 3.6 may face increased risk of targeted attacks exploiting this flaw. Additionally, sectors with high public interaction and reliance on captive portals, such as tourism and hospitality, are particularly vulnerable. The medium severity rating reflects the moderate risk level but underscores the importance of timely mitigation to prevent exploitation. The absence of known exploits in the wild currently limits immediate impact, but proactive measures are essential to avoid future attacks.

Mitigation Recommendations

Since no official patches are currently available for Kiwire 3.6, organizations should implement immediate compensating controls. First, validate and sanitize the login-url parameter rigorously to ensure only trusted URLs within the organization's domain are accepted for redirection. Implement strict allowlists for redirect destinations and reject or log any attempts to redirect to external or untrusted domains. Employ web application firewalls (WAFs) with rules to detect and block open redirection attempts targeting the login-url parameter. Educate users about the risks of clicking unexpected links, especially those originating from captive portals. Monitor network traffic and logs for unusual redirection patterns or spikes in phishing attempts. Where feasible, upgrade to a newer, patched version of Kiwire once available or consider alternative captive portal solutions with better security postures. Additionally, implement multi-factor authentication (MFA) on captive portal login processes to reduce the impact of credential theft resulting from phishing. Regularly review and update security policies governing public Wi-Fi access to incorporate these mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
certcc
Date Reserved
2025-09-30T12:21:52.881Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e8ea6230774abc8f786ea6

Added to database: 10/10/2025, 11:13:38 AM

Last enriched: 11/3/2025, 6:19:16 PM

Last updated: 11/24/2025, 8:36:09 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats