Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1885: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Restajet Information Technologies Inc. Online Food Delivery System

0
Medium
VulnerabilityCVE-2025-1885cvecve-2025-1885cwe-601
Published: Fri Dec 19 2025 (12/19/2025, 11:47:32 UTC)
Source: CVE Database V5
Vendor/Project: Restajet Information Technologies Inc.
Product: Online Food Delivery System

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Phishing, Forceful Browsing.This issue affects Online Food Delivery System: through 19122025.

AI-Powered Analysis

AILast updated: 12/26/2025, 12:57:25 UTC

Technical Analysis

CVE-2025-1885 identifies an Open Redirect vulnerability (CWE-601) in the Restajet Information Technologies Inc. Online Food Delivery System, affecting versions up to 19122025. Open Redirect vulnerabilities occur when a web application accepts untrusted input that specifies a link to an external site and redirects users without proper validation. In this case, the system improperly handles URL redirection parameters, allowing attackers to craft malicious URLs that redirect victims to phishing sites or other malicious domains. This can be exploited to conduct phishing campaigns by luring users into clicking seemingly legitimate links that lead to fraudulent sites designed to steal credentials or deliver malware. Additionally, forceful browsing attacks may leverage this vulnerability to bypass intended navigation flows. The CVSS 3.1 vector indicates the attack is network-based (AV:N), requires low attack complexity (AC:L), needs privileges (PR:L), requires user interaction (UI:R), and affects confidentiality minimally (C:N), integrity slightly (I:L), and availability slightly (A:L) with a scope change (S:C). No patches or known exploits are currently available, which means organizations must proactively implement mitigations. The vulnerability's presence in an online food delivery platform is critical because such platforms handle sensitive user data and payment information, making them attractive targets for attackers aiming to exploit user trust and gain unauthorized access or disrupt service.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through enabling phishing attacks that can compromise user credentials and potentially lead to unauthorized transactions or data breaches. The forced redirection to malicious sites can erode customer trust and damage brand reputation, especially in the competitive online food delivery market. Additionally, attackers could exploit the vulnerability to disrupt service availability or facilitate further attacks by redirecting users to malware-hosting sites. Given the widespread adoption of online food delivery services in Europe, especially in countries with high e-commerce penetration, the impact could be significant if exploited at scale. Organizations may also face regulatory scrutiny under GDPR if user data is compromised due to phishing or related attacks stemming from this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-1885, organizations should implement strict validation and sanitization of all URL redirection parameters to ensure only trusted destinations are allowed. Employing an allowlist approach for redirect URLs is recommended to prevent arbitrary external redirects. Additionally, security teams should monitor web traffic for unusual redirect patterns and suspicious URLs. User education campaigns should be conducted to raise awareness about phishing risks associated with unexpected redirects. Where possible, multi-factor authentication (MFA) should be enforced to reduce the impact of credential theft. Organizations should also engage with Restajet Information Technologies Inc. to obtain patches or updates once available and apply them promptly. Implementing Content Security Policy (CSP) headers can help mitigate the impact of malicious redirects by restricting the domains that can be loaded. Finally, penetration testing and vulnerability scanning should be conducted regularly to detect any residual or new redirect issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-03-03T12:34:02.399Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69453d1ba90e3c9a152a49e6

Added to database: 12/19/2025, 11:55:07 AM

Last enriched: 12/26/2025, 12:57:25 PM

Last updated: 2/7/2026, 9:52:33 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats