Skip to main content

CVE-2025-3155: URL Redirection to Untrusted Site ('Open Redirect')

High
VulnerabilityCVE-2025-3155cvecve-2025-3155
Published: Thu Apr 03 2025 (04/03/2025, 13:34:18 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.

AI-Powered Analysis

AILast updated: 08/13/2025, 00:40:28 UTC

Technical Analysis

CVE-2025-3155 is a high-severity vulnerability affecting Red Hat Enterprise Linux 8, specifically related to the Gnome user help application. The vulnerability arises because the help application allows execution of arbitrary scripts embedded within help documents. This flaw enables an attacker to craft malicious help documents that, when opened by a user, can execute scripts capable of exfiltrating user files to external environments. Although the description mentions Yelp and URL redirection, the core technical issue is with the Gnome help system's insufficient validation and sandboxing of help content, leading to arbitrary script execution. The vulnerability does not require privileges or authentication but does require user interaction (opening the malicious help document). The CVSS 3.1 score is 7.4 (high), with the vector indicating network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and high confidentiality impact but no integrity or availability impact. This means an attacker can remotely lure a user into opening a malicious help document, resulting in unauthorized disclosure of sensitive files without altering or disrupting system operations. No known exploits are currently in the wild, and no patches or mitigation links are provided yet. The vulnerability is significant because it leverages a trusted system component (Gnome help) to bypass typical security controls and exfiltrate data stealthily.

Potential Impact

For European organizations, especially those using Red Hat Enterprise Linux 8 with Gnome desktop environments, this vulnerability poses a serious risk to confidentiality. Sensitive corporate or personal data could be exfiltrated without detection if users open malicious help documents, potentially leading to data breaches and compliance violations under GDPR. The lack of integrity and availability impact limits the threat to data leakage rather than system disruption. However, the stealthy nature of the attack could delay detection and response, increasing the window for data loss. Organizations in sectors with strict data protection requirements (finance, healthcare, government) are particularly vulnerable. The requirement for user interaction means social engineering or phishing campaigns could be used to deliver the malicious documents, increasing the attack surface. The vulnerability's presence in a widely used enterprise Linux distribution means that many European enterprises relying on Red Hat for critical infrastructure or development environments could be affected.

Mitigation Recommendations

1. Immediately educate users about the risks of opening untrusted help documents or files, emphasizing caution with any unexpected or unsolicited help content. 2. Restrict or disable the Gnome help application where feasible, especially on systems handling sensitive data or in high-risk environments. 3. Implement application whitelisting and script execution restrictions to prevent unauthorized scripts from running within help documents. 4. Monitor network traffic for unusual outbound connections or data exfiltration attempts originating from user workstations. 5. Deploy endpoint detection and response (EDR) solutions capable of detecting anomalous script execution and data transfer behaviors. 6. Apply any patches or updates from Red Hat as soon as they become available to remediate the vulnerability. 7. Use sandboxing or containerization for user applications to limit the impact of arbitrary script execution. 8. Enhance email and phishing defenses to reduce the likelihood of malicious help documents reaching end users. 9. Conduct regular security awareness training focusing on social engineering and safe handling of help or documentation files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-03T02:00:30.674Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec927

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 8/13/2025, 12:40:28 AM

Last updated: 8/18/2025, 1:22:21 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats