Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21401: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Microsoft Microsoft Edge (Chromium-based)

0
Medium
VulnerabilityCVE-2025-21401cvecve-2025-21401cwe-601
Published: Fri Feb 14 2025 (02/14/2025, 23:16:06 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Edge (Chromium-based)

Description

Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:49:55 UTC

Technical Analysis

CVE-2025-21401 is classified as a CWE-601 'URL Redirection to Untrusted Site' vulnerability affecting Microsoft Edge (Chromium-based) version 1.0.0.0. This vulnerability allows an attacker to craft URLs that cause the browser to redirect users to malicious or untrusted websites, effectively bypassing security controls designed to prevent such behavior. The attack vector is local, meaning the attacker must have some form of local access or the ability to deliver a malicious link to the user. The attack complexity is high, requiring specific conditions to be met, and user interaction is necessary to trigger the redirect. The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as it primarily facilitates phishing or social engineering attacks rather than direct system compromise. No public exploits have been reported, and no patches are currently linked, indicating that mitigation relies on future updates and defensive measures. The vulnerability is rated medium severity with a CVSS 3.1 score of 4.5, reflecting moderate risk. The flaw represents a security feature bypass, undermining trust in URL validation within the browser and potentially exposing users to malicious sites without adequate warning or prevention.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing campaigns. Attackers could exploit the open redirect to lure employees into visiting malicious websites that harvest credentials, deliver malware, or conduct further attacks. While the direct impact on system integrity or availability is limited, the indirect consequences could be significant if attackers gain access to sensitive information or deploy secondary payloads. Organizations relying heavily on Microsoft Edge (Chromium-based) version 1.0.0.0, especially in sectors such as finance, government, and critical infrastructure, may face increased exposure. The need for user interaction and high attack complexity somewhat limits widespread exploitation, but targeted attacks against high-value individuals or entities remain a concern. The absence of known exploits in the wild suggests the threat is currently low but could escalate once exploit code becomes available.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply patches or updates for Microsoft Edge as soon as they are released to address this vulnerability. 2. Until patches are available, consider restricting the use of the affected Edge version or deploying alternative browsers with no known vulnerabilities. 3. Implement URL filtering and web proxy solutions that can detect and block suspicious redirects or known malicious domains to reduce exposure. 4. Enhance user awareness training focusing on recognizing phishing attempts and the risks of clicking on untrusted links, emphasizing caution with URLs that appear suspicious or unexpected. 5. Employ multi-factor authentication (MFA) across critical systems to mitigate the impact of credential theft resulting from phishing. 6. Use endpoint detection and response (EDR) tools to monitor for unusual browser behavior or redirection patterns that could indicate exploitation attempts. 7. Review and tighten browser security policies, including disabling or restricting automatic redirects where feasible. 8. Conduct regular security assessments and penetration tests to identify and remediate similar weaknesses in the organization's environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.375Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f03058703ef3fc9859c

Added to database: 12/17/2025, 10:30:27 PM

Last enriched: 2/14/2026, 8:49:55 AM

Last updated: 3/23/2026, 10:13:04 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses