Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13819: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in MiR Robot

0
Medium
VulnerabilityCVE-2025-13819cvecve-2025-13819cwe-601
Published: Mon Dec 01 2025 (12/01/2025, 09:41:08 UTC)
Source: CVE Database V5
Vendor/Project: MiR
Product: Robot

Description

Open redirect in the web server component of MiR Robot and Fleet software allows a remote attacker to redirect users to arbitrary external websites via a crafted parameter, facilitating phishing or social engineering attacks.

AI-Powered Analysis

AILast updated: 12/08/2025, 10:48:40 UTC

Technical Analysis

CVE-2025-13819 identifies an open redirect vulnerability (CWE-601) in the web server component of MiR Robot and Fleet software. This vulnerability arises because the software improperly validates URL parameters used for redirection, allowing an attacker to craft malicious URLs that redirect users to arbitrary external websites. The flaw can be exploited remotely without authentication, but requires user interaction to click on the malicious link. The vulnerability's CVSS 3.1 score is 6.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). This vulnerability can facilitate phishing or social engineering attacks by redirecting users to malicious sites that may attempt credential theft or malware delivery. Although no known exploits are currently reported in the wild, the presence of this vulnerability in robotic fleet management software is concerning due to the critical nature of industrial automation environments. The affected product version is listed as '0', which likely indicates initial or early versions of the software. The vulnerability was published on December 1, 2025, and no patches or vendor advisories are currently available. The open redirect issue is a common web security flaw that can be mitigated by proper input validation and restricting redirect targets to trusted domains only.

Potential Impact

For European organizations, especially those in manufacturing, logistics, and industrial automation sectors that deploy MiR Robots and fleet management software, this vulnerability poses a risk of phishing and social engineering attacks. Attackers could exploit the open redirect to lure employees or operators into visiting malicious websites, potentially leading to credential compromise or malware infections. Although the direct impact on the robotic systems' confidentiality, integrity, or availability is low, the indirect impact through compromised user credentials or social engineering could lead to unauthorized access or disruption of robotic operations. Given the increasing adoption of robotics in European industry, this vulnerability could affect operational security and trust in automated systems. The scope of affected systems is limited to those using vulnerable versions of MiR Robot software, but the changed scope (S:C) in CVSS indicates that exploitation could affect resources beyond the initially vulnerable component, such as user sessions or network trust boundaries.

Mitigation Recommendations

Organizations should implement strict input validation and sanitization on all URL parameters used for redirection within MiR Robot and Fleet web interfaces. Specifically, restrict redirect URLs to a whitelist of trusted domains or use relative paths instead of absolute URLs. Until a vendor patch is released, consider deploying web application firewalls (WAFs) to detect and block suspicious redirect attempts. Educate users and operators on the risks of clicking on unexpected or suspicious links, especially those purportedly related to robotic fleet management. Monitor network traffic for unusual outbound connections that could indicate exploitation attempts. Engage with MiR vendor support to obtain timelines for patches or updates addressing this vulnerability. Additionally, review and tighten access controls and session management to limit the impact of potential credential compromise resulting from phishing attacks leveraging this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TRO
Date Reserved
2025-12-01T08:28:24.452Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692d652686d7d117cd35a8dd

Added to database: 12/1/2025, 9:51:34 AM

Last enriched: 12/8/2025, 10:48:40 AM

Last updated: 1/19/2026, 6:25:24 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats