CVE-2025-34439: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in World Wide Broadcast Network AVideo
AVideo versions prior to 20.0 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.
AI Analysis
Technical Summary
CVE-2025-34439 is an open redirect vulnerability identified in the World Wide Broadcast Network's AVideo product, affecting versions prior to 20.0. The root cause is the lack of proper validation of the 'cancelUri' parameter during the user login process. When a user attempts to log in, the application accepts a URL parameter intended to redirect the user upon cancellation of the login process. Because this parameter is not validated, an attacker can craft a URL that redirects users to arbitrary external websites, which may be malicious. This can be leveraged in phishing campaigns where users believe they are interacting with a legitimate service but are redirected to attacker-controlled sites designed to steal credentials or distribute malware. The vulnerability has a CVSS 4.8 score, reflecting that it is network exploitable without authentication but requires user interaction (clicking the malicious link). The impact on confidentiality, integrity, and availability is limited, but the risk lies in social engineering and trust exploitation. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor updates or manual mitigations. The vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site).
Potential Impact
For European organizations, especially those using AVideo as a platform for video content delivery, this vulnerability poses a moderate phishing risk. Attackers can exploit the open redirect to lure users into visiting malicious sites, potentially leading to credential theft, malware infections, or further social engineering attacks. This can result in reputational damage, loss of user trust, and potential regulatory scrutiny under GDPR if user data is compromised. The impact is more pronounced for organizations with large user bases or those operating in sectors where trust and brand reputation are critical, such as media, education, and government. While the vulnerability does not directly compromise system integrity or availability, the indirect effects through phishing can lead to broader security incidents. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities rapidly once disclosed.
Mitigation Recommendations
Organizations should prioritize upgrading to AVideo version 20.0 or later once the patch is released by the vendor to ensure the cancelUri parameter is properly validated. Until an official patch is available, administrators can implement input validation controls at the web server or application firewall level to restrict redirect URLs to trusted domains only. Additionally, security teams should monitor for suspicious URLs containing the cancelUri parameter in logs and user reports. User education campaigns should emphasize caution when clicking on login-related links, especially those received via email or messaging platforms. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Finally, organizations should review their incident response plans to quickly address any phishing incidents stemming from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-34439: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in World Wide Broadcast Network AVideo
Description
AVideo versions prior to 20.0 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-34439 is an open redirect vulnerability identified in the World Wide Broadcast Network's AVideo product, affecting versions prior to 20.0. The root cause is the lack of proper validation of the 'cancelUri' parameter during the user login process. When a user attempts to log in, the application accepts a URL parameter intended to redirect the user upon cancellation of the login process. Because this parameter is not validated, an attacker can craft a URL that redirects users to arbitrary external websites, which may be malicious. This can be leveraged in phishing campaigns where users believe they are interacting with a legitimate service but are redirected to attacker-controlled sites designed to steal credentials or distribute malware. The vulnerability has a CVSS 4.8 score, reflecting that it is network exploitable without authentication but requires user interaction (clicking the malicious link). The impact on confidentiality, integrity, and availability is limited, but the risk lies in social engineering and trust exploitation. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor updates or manual mitigations. The vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site).
Potential Impact
For European organizations, especially those using AVideo as a platform for video content delivery, this vulnerability poses a moderate phishing risk. Attackers can exploit the open redirect to lure users into visiting malicious sites, potentially leading to credential theft, malware infections, or further social engineering attacks. This can result in reputational damage, loss of user trust, and potential regulatory scrutiny under GDPR if user data is compromised. The impact is more pronounced for organizations with large user bases or those operating in sectors where trust and brand reputation are critical, such as media, education, and government. While the vulnerability does not directly compromise system integrity or availability, the indirect effects through phishing can lead to broader security incidents. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities rapidly once disclosed.
Mitigation Recommendations
Organizations should prioritize upgrading to AVideo version 20.0 or later once the patch is released by the vendor to ensure the cancelUri parameter is properly validated. Until an official patch is available, administrators can implement input validation controls at the web server or application firewall level to restrict redirect URLs to trusted domains only. Additionally, security teams should monitor for suspicious URLs containing the cancelUri parameter in logs and user reports. User education campaigns should emphasize caution when clicking on login-related links, especially those received via email or messaging platforms. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Finally, organizations should review their incident response plans to quickly address any phishing incidents stemming from this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.601Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694309ba0b6f32e62bf653cb
Added to database: 12/17/2025, 7:51:22 PM
Last enriched: 12/17/2025, 7:59:55 PM
Last updated: 12/18/2025, 3:53:56 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.