Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12789: URL Redirection to Untrusted Site ('Open Redirect') in Red Hat Red Hat Single Sign-On 7

0
Medium
VulnerabilityCVE-2025-12789cvecve-2025-12789
Published: Thu Nov 06 2025 (11/06/2025, 23:20:50 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Single Sign-On 7

Description

A flaw was found in Red Hat Single Sign-On. This issue is an Open Redirect vulnerability that occurs during the logout process. The redirect_uri parameter associated with the openid-connect logout protocol does not properly validate the provided URL.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:09:15 UTC

Technical Analysis

CVE-2025-12789 is an Open Redirect vulnerability identified in Red Hat Single Sign-On (RH-SSO) version 7, specifically affecting the logout process. The vulnerability stems from improper validation of the redirect_uri parameter used in the OpenID Connect logout protocol. During logout, RH-SSO allows redirection to a URL specified by this parameter without adequately verifying whether the URL is trusted or belongs to an allowed domain. This flaw enables attackers to craft malicious logout links that redirect users to arbitrary external websites, potentially facilitating phishing attacks or other social engineering exploits by leveraging the trust users place in the legitimate RH-SSO domain. The vulnerability does not require authentication but does require user interaction to trigger the redirect. The CVSS v3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction needed, scope changed, and low impact on confidentiality and integrity but no impact on availability. No patches or exploits are currently reported, but the vulnerability poses a risk to organizations relying on RH-SSO for identity and access management, especially in environments where logout redirection is used in workflows or user interfaces.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to redirect users to malicious websites during the logout process, which can be exploited for phishing, credential harvesting, or delivering malware. Although the vulnerability does not directly compromise system availability or allow privilege escalation, it undermines user trust and the integrity of the logout flow. Organizations using RH-SSO 7 may face increased risk of social engineering attacks targeting their employees or customers. This can lead to data breaches if users are tricked into divulging sensitive information or installing malicious software. The scope of affected systems includes any deployment of RH-SSO 7 that uses the OpenID Connect logout protocol with redirect_uri parameters. Given the widespread use of Red Hat products in enterprise and government sectors, the impact could be significant in environments where secure logout and redirection are critical for session management and user experience.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict validation of the redirect_uri parameter to ensure it only allows redirection to trusted, whitelisted domains. This can be done by configuring RH-SSO to enforce exact or pattern-based matching of redirect URIs during logout. Additionally, administrators should review and restrict logout redirection workflows to minimize unnecessary redirects. Monitoring and logging logout requests with redirect parameters can help detect suspicious activity. Applying any vendor-released patches or updates as soon as they become available is crucial. In the absence of patches, consider disabling or limiting the use of logout redirection features temporarily. User education on recognizing phishing attempts and suspicious redirects can also reduce the risk of exploitation. Finally, integrating web application firewalls (WAFs) to detect and block malicious redirect attempts may provide an additional layer of defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-11-06T02:26:31.270Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d31bfc99da72cbe178d6f

Added to database: 11/6/2025, 11:39:43 PM

Last enriched: 2/27/2026, 9:09:15 PM

Last updated: 3/24/2026, 12:57:04 PM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses