Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34439: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in World Wide Broadcast Network AVideo

0
Medium
VulnerabilityCVE-2025-34439cvecve-2025-34439cwe-601
Published: Wed Dec 17 2025 (12/17/2025, 19:49:38 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.0 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:59:55 UTC

Technical Analysis

CVE-2025-34439 is an open redirect vulnerability identified in the World Wide Broadcast Network's AVideo product, affecting versions prior to 20.0. The root cause is the lack of proper validation of the 'cancelUri' parameter during the user login process. When a user attempts to log in, the application accepts a URL parameter intended to redirect the user upon cancellation of the login process. Because this parameter is not validated, an attacker can craft a URL that redirects users to arbitrary external websites, which may be malicious. This can be leveraged in phishing campaigns where users believe they are interacting with a legitimate service but are redirected to attacker-controlled sites designed to steal credentials or distribute malware. The vulnerability has a CVSS 4.8 score, reflecting that it is network exploitable without authentication but requires user interaction (clicking the malicious link). The impact on confidentiality, integrity, and availability is limited, but the risk lies in social engineering and trust exploitation. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor updates or manual mitigations. The vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site).

Potential Impact

For European organizations, especially those using AVideo as a platform for video content delivery, this vulnerability poses a moderate phishing risk. Attackers can exploit the open redirect to lure users into visiting malicious sites, potentially leading to credential theft, malware infections, or further social engineering attacks. This can result in reputational damage, loss of user trust, and potential regulatory scrutiny under GDPR if user data is compromised. The impact is more pronounced for organizations with large user bases or those operating in sectors where trust and brand reputation are critical, such as media, education, and government. While the vulnerability does not directly compromise system integrity or availability, the indirect effects through phishing can lead to broader security incidents. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities rapidly once disclosed.

Mitigation Recommendations

Organizations should prioritize upgrading to AVideo version 20.0 or later once the patch is released by the vendor to ensure the cancelUri parameter is properly validated. Until an official patch is available, administrators can implement input validation controls at the web server or application firewall level to restrict redirect URLs to trusted domains only. Additionally, security teams should monitor for suspicious URLs containing the cancelUri parameter in logs and user reports. User education campaigns should emphasize caution when clicking on login-related links, especially those received via email or messaging platforms. Implementing multi-factor authentication (MFA) can reduce the impact of credential theft resulting from phishing. Finally, organizations should review their incident response plans to quickly address any phishing incidents stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694309ba0b6f32e62bf653cb

Added to database: 12/17/2025, 7:51:22 PM

Last enriched: 12/17/2025, 7:59:55 PM

Last updated: 12/18/2025, 3:53:56 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats