Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15112: URL Redirection to Untrusted Site ('Open Redirect') in Ksenia Security S.p.A. Ksenia Security Lares 4.0 Home Automation

0
Medium
VulnerabilityCVE-2025-15112cvecve-2025-15112
Published: Tue Dec 30 2025 (12/30/2025, 22:41:46 UTC)
Source: CVE Database V5
Vendor/Project: Ksenia Security S.p.A.
Product: Ksenia Security Lares 4.0 Home Automation

Description

Ksenia Security Lares 4.0 version 1.6 contains a URL redirection vulnerability in the 'cmdOk.xml' script that allows attackers to manipulate the 'redirectPage' GET parameter. Attackers can craft malicious links that redirect authenticated users to arbitrary websites when clicking on a specially constructed link hosted on a trusted domain.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:24:12 UTC

Technical Analysis

CVE-2025-15112 identifies an open redirect vulnerability in Ksenia Security Lares 4.0 Home Automation software, specifically affecting versions 1.6 and 1.0.0.15. The vulnerability resides in the 'cmdOk.xml' script, which processes a 'redirectPage' GET parameter without proper validation or sanitization. Attackers can exploit this by crafting URLs that appear to originate from a trusted domain but redirect authenticated users to arbitrary external websites. This type of vulnerability is commonly used in phishing attacks to trick users into visiting malicious sites, potentially leading to credential theft or malware infection. The vulnerability requires user interaction (clicking the malicious link) but does not require any special privileges or authentication bypass. The CVSS 4.0 score is 5.1 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction. The vulnerability does not directly compromise confidentiality, integrity, or availability of the home automation system but poses a risk through social engineering. No patches or known exploits have been reported at the time of publication. The vulnerability is particularly relevant for environments where Ksenia Security Lares 4.0 is deployed, including residential and commercial home automation systems, which may be integrated into larger building management or security infrastructures.

Potential Impact

For European organizations, the primary impact of CVE-2025-15112 is the increased risk of successful phishing or social engineering attacks leveraging trusted domains to redirect users to malicious sites. This can lead to credential compromise, malware infections, or unauthorized access if users are tricked into divulging sensitive information. While the vulnerability does not directly affect the confidentiality, integrity, or availability of the Lares 4.0 system itself, it undermines user trust and can serve as a vector for broader attacks against corporate networks or critical infrastructure. Organizations relying on Ksenia Security products for home or building automation may face reputational damage and operational disruptions if attackers exploit this vulnerability to target employees or residents. The risk is heightened in environments where users have elevated privileges or where the home automation system interfaces with other critical systems. Additionally, attackers could use the open redirect to bypass security controls such as web filters or email scanners by leveraging trusted domains. The absence of known exploits suggests the threat is currently theoretical but should be addressed proactively.

Mitigation Recommendations

To mitigate CVE-2025-15112, organizations should implement strict validation and sanitization of the 'redirectPage' parameter within the 'cmdOk.xml' script to ensure redirection only occurs to approved, internal URLs. If possible, disable or restrict the use of open redirect parameters entirely. Network-level controls such as web proxies or URL filtering can block access to known malicious domains and detect suspicious redirect patterns. User education is critical; train users to recognize suspicious links even if they appear to originate from trusted domains and to verify URLs before clicking. Monitoring and logging of redirect activities can help detect exploitation attempts. Organizations should also engage with Ksenia Security to obtain patches or updates that address this vulnerability once available. For environments where patching is delayed, consider isolating the affected systems from critical networks or limiting user access to the affected interface. Incident response plans should include procedures for handling phishing attempts leveraging this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-27T01:46:41.722Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954592edb813ff03e385594

Added to database: 12/30/2025, 10:58:54 PM

Last enriched: 1/17/2026, 7:24:12 AM

Last updated: 2/5/2026, 11:32:45 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats