CVE-2025-30164: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Icinga icingaweb2
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 vulnerability allows an attacker to craft a URL that, once visited by an authenticated user (or one that is able to authenticate), allows to manipulate the backend to redirect the user to any location. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2025-30164 is a medium-severity vulnerability classified as CWE-601 (Open Redirect) affecting Icinga Web 2, an open-source monitoring web interface and framework widely used for IT infrastructure monitoring. The vulnerability exists in versions prior to 2.11.5 and between 2.12.0 and 2.12.3, allowing an attacker to craft malicious URLs that, when visited by an authenticated user or a user capable of authenticating, cause the backend to redirect the user to an arbitrary external location. This redirection can be exploited to facilitate phishing attacks, credential theft, or delivery of malicious payloads by leveraging the trust users place in the legitimate Icinga Web 2 interface. The vulnerability requires at least some level of user authentication and user interaction (clicking the crafted URL). The CVSS 3.1 base score is 4.1, reflecting a network attack vector with low complexity, requiring privileges and user interaction, and resulting in no confidentiality impact but limited integrity impact and no availability impact. No known exploits are currently in the wild, and no workarounds exist aside from upgrading to fixed versions 2.11.5 or 2.12.3 and later. This vulnerability highlights the risk of insufficient validation of redirect URLs within the application, which can be abused to redirect users to untrusted sites.
Potential Impact
For European organizations using Icinga Web 2 for monitoring critical IT infrastructure, this vulnerability poses a moderate risk. While it does not directly compromise system confidentiality or availability, it enables attackers to conduct social engineering attacks by redirecting authenticated users to malicious sites. This can lead to credential harvesting, session hijacking, or malware delivery, potentially undermining the security of the monitoring environment and broader IT systems. Given that monitoring platforms often have privileged access and visibility into network and system health, compromising user trust in these interfaces can have cascading effects, including delayed incident detection or unauthorized access escalation. The requirement for user authentication and interaction limits the scope but does not eliminate risk, especially in environments with many users or where phishing defenses are weak. European organizations with regulatory obligations around data protection and incident response must consider the reputational and compliance implications of such attacks.
Mitigation Recommendations
The primary mitigation is to upgrade Icinga Web 2 installations to versions 2.11.5 or 2.12.3 and above, where the vulnerability is patched. Organizations should audit their current versions and plan immediate upgrades. Additionally, implement strict URL validation and sanitization on any internal or external links generated by the monitoring interface to prevent open redirects. Employ multi-factor authentication (MFA) to reduce the risk of compromised credentials being exploited. Educate users about phishing risks, especially regarding unexpected redirects from trusted internal tools. Monitor logs for unusual redirect patterns or access attempts. Network-level controls such as web filtering and DNS filtering can help block access to known malicious domains that could be used in redirection attacks. Finally, consider isolating the monitoring interface behind VPNs or zero-trust access gateways to limit exposure to authenticated users only.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-30164: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Icinga icingaweb2
Description
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 vulnerability allows an attacker to craft a URL that, once visited by an authenticated user (or one that is able to authenticate), allows to manipulate the backend to redirect the user to any location. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-30164 is a medium-severity vulnerability classified as CWE-601 (Open Redirect) affecting Icinga Web 2, an open-source monitoring web interface and framework widely used for IT infrastructure monitoring. The vulnerability exists in versions prior to 2.11.5 and between 2.12.0 and 2.12.3, allowing an attacker to craft malicious URLs that, when visited by an authenticated user or a user capable of authenticating, cause the backend to redirect the user to an arbitrary external location. This redirection can be exploited to facilitate phishing attacks, credential theft, or delivery of malicious payloads by leveraging the trust users place in the legitimate Icinga Web 2 interface. The vulnerability requires at least some level of user authentication and user interaction (clicking the crafted URL). The CVSS 3.1 base score is 4.1, reflecting a network attack vector with low complexity, requiring privileges and user interaction, and resulting in no confidentiality impact but limited integrity impact and no availability impact. No known exploits are currently in the wild, and no workarounds exist aside from upgrading to fixed versions 2.11.5 or 2.12.3 and later. This vulnerability highlights the risk of insufficient validation of redirect URLs within the application, which can be abused to redirect users to untrusted sites.
Potential Impact
For European organizations using Icinga Web 2 for monitoring critical IT infrastructure, this vulnerability poses a moderate risk. While it does not directly compromise system confidentiality or availability, it enables attackers to conduct social engineering attacks by redirecting authenticated users to malicious sites. This can lead to credential harvesting, session hijacking, or malware delivery, potentially undermining the security of the monitoring environment and broader IT systems. Given that monitoring platforms often have privileged access and visibility into network and system health, compromising user trust in these interfaces can have cascading effects, including delayed incident detection or unauthorized access escalation. The requirement for user authentication and interaction limits the scope but does not eliminate risk, especially in environments with many users or where phishing defenses are weak. European organizations with regulatory obligations around data protection and incident response must consider the reputational and compliance implications of such attacks.
Mitigation Recommendations
The primary mitigation is to upgrade Icinga Web 2 installations to versions 2.11.5 or 2.12.3 and above, where the vulnerability is patched. Organizations should audit their current versions and plan immediate upgrades. Additionally, implement strict URL validation and sanitization on any internal or external links generated by the monitoring interface to prevent open redirects. Employ multi-factor authentication (MFA) to reduce the risk of compromised credentials being exploited. Educate users about phishing risks, especially regarding unexpected redirects from trusted internal tools. Monitor logs for unusual redirect patterns or access attempts. Network-level controls such as web filtering and DNS filtering can help block access to known malicious domains that could be used in redirection attacks. Finally, consider isolating the monitoring interface behind VPNs or zero-trust access gateways to limit exposure to authenticated users only.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-03-17T12:41:42.567Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6c44
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 4:01:25 AM
Last updated: 8/12/2025, 4:20:35 AM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.