Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34439: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in World Wide Broadcast Network AVideo

0
Medium
VulnerabilityCVE-2025-34439cvecve-2025-34439cwe-601
Published: Wed Dec 17 2025 (12/17/2025, 19:49:38 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.1 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.

AI-Powered Analysis

AILast updated: 12/24/2025, 20:19:05 UTC

Technical Analysis

CVE-2025-34439 is an open redirect vulnerability identified in the AVideo platform developed by World Wide Broadcast Network, affecting versions prior to 20.1. The root cause is the lack of proper validation of the cancelUri parameter during the user login process. This parameter is intended to redirect users after login cancellation, but due to insufficient checks, an attacker can manipulate it to redirect users to arbitrary external websites. Such open redirect flaws are commonly exploited in phishing attacks, where malicious actors craft URLs that appear legitimate but redirect victims to fraudulent sites designed to steal credentials or deliver malware. The vulnerability requires no authentication but does require user interaction, as the victim must click on the crafted link. The CVSS 4.0 vector indicates low attack complexity, no privileges required, and user interaction necessary, with limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, suggesting the vulnerability is newly disclosed or not yet weaponized. The absence of patch links implies that a fixed version (20.1 or later) is available but not explicitly referenced here. This vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site), a common web security issue that can undermine user trust and facilitate social engineering attacks.

Potential Impact

For European organizations, especially those utilizing AVideo for internal or public video streaming services, this vulnerability can be leveraged to conduct targeted phishing campaigns. Attackers can exploit the open redirect to lure users into visiting malicious websites that may harvest credentials, distribute malware, or perform other fraudulent activities. This can lead to compromised user accounts, data breaches, and reputational damage. The impact is primarily on user trust and confidentiality rather than system integrity or availability. Organizations in sectors with high reliance on video content delivery, such as media, education, and corporate communications, face increased risk. Additionally, phishing attacks exploiting this vulnerability could serve as initial access vectors for more sophisticated intrusions. The medium severity rating reflects the moderate risk, given the need for user interaction and the limited direct impact on core systems.

Mitigation Recommendations

1. Upgrade AVideo installations to version 20.1 or later where this vulnerability is addressed. 2. Implement strict validation or whitelisting of redirect URLs in the cancelUri parameter to ensure only trusted internal URLs are allowed. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. 4. Conduct user awareness training focused on recognizing phishing attempts and suspicious URLs, emphasizing caution with links received via email or messaging platforms. 5. Monitor logs for unusual redirect activity or spikes in login cancellations that may indicate exploitation attempts. 6. If upgrading immediately is not feasible, consider temporarily disabling or restricting the use of the cancelUri parameter. 7. Collaborate with security teams to perform penetration testing and vulnerability assessments on AVideo deployments to identify and remediate related issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694309ba0b6f32e62bf653cb

Added to database: 12/17/2025, 7:51:22 PM

Last enriched: 12/24/2025, 8:19:05 PM

Last updated: 2/5/2026, 7:56:50 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats