Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15112: CWE-601 URL redirection to untrusted site ('open redirect') in Ksenia Security S.p.A. lares

0
Medium
VulnerabilityCVE-2025-15112cvecve-2025-15112cwe-601
Published: Tue Dec 30 2025 (12/30/2025, 22:41:46 UTC)
Source: CVE Database V5
Vendor/Project: Ksenia Security S.p.A.
Product: lares

Description

Ksenia Security lares (legacy model) version 1.6 contains a URL redirection vulnerability in the 'cmdOk.xml' script that allows attackers to manipulate the 'redirectPage' GET parameter. Attackers can craft malicious links that redirect authenticated users to arbitrary websites when clicking on a specially constructed link hosted on a trusted domain.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/15/2026, 00:56:57 UTC

Technical Analysis

CVE-2025-15112 identifies an open redirect vulnerability classified under CWE-601 in Ksenia Security S.p.A.'s lares legacy model, specifically versions 1.6 and 1.0.0.15. The vulnerability resides in the 'cmdOk.xml' script, where the 'redirectPage' GET parameter is not properly validated or sanitized, allowing an attacker to manipulate it to redirect users to arbitrary external URLs. This flaw enables attackers to craft malicious links that appear to originate from a trusted domain but redirect authenticated users to potentially harmful websites. The vulnerability does not require any authentication or privileges and can be exploited remotely with only user interaction (clicking the malicious link). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:A), and no impact on confidentiality, integrity, or availability (VC:N/VI:N/VA:N). Although no known exploits are currently reported, the vulnerability can be leveraged in phishing campaigns or social engineering attacks to deceive users into visiting malicious sites, potentially leading to credential theft or malware infection. The lack of patches or official remediation guidance necessitates immediate attention from organizations using these affected versions. The vulnerability's medium severity rating reflects the moderate risk posed by the ease of exploitation combined with limited direct impact on system security.

Potential Impact

The primary impact of CVE-2025-15112 is the facilitation of phishing and social engineering attacks by leveraging trusted domains to redirect users to malicious sites. This can lead to credential compromise, malware infections, or further exploitation if users are tricked into divulging sensitive information or downloading malicious payloads. While the vulnerability itself does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks. Organizations relying on Ksenia Security lares legacy models in critical infrastructure or security-sensitive environments may face increased risk of targeted phishing campaigns. The ease of exploitation without authentication and the ability to host malicious links on trusted domains amplify the threat's potential impact. Additionally, the absence of known exploits in the wild suggests that attackers may develop weaponized attacks in the future, increasing risk over time.

Mitigation Recommendations

Organizations should immediately review and restrict the use of the 'redirectPage' parameter in the 'cmdOk.xml' script to prevent open redirect abuse. Specific mitigations include implementing strict validation and sanitization of the 'redirectPage' parameter to allow only internal or whitelisted URLs. If possible, disable or remove the vulnerable redirect functionality entirely. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. Educate users about the risks of clicking on unexpected links, even if they appear to originate from trusted domains. Monitor logs for unusual redirect requests and investigate suspicious activity. Since no official patches are currently available, organizations should engage with Ksenia Security for updates or consider upgrading to newer, unaffected product versions. Additionally, implement multi-factor authentication and robust endpoint protection to mitigate downstream risks from phishing attacks enabled by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-27T01:46:41.722Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954592edb813ff03e385594

Added to database: 12/30/2025, 10:58:54 PM

Last enriched: 3/15/2026, 12:56:57 AM

Last updated: 3/26/2026, 3:37:28 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses