CVE-2025-34439: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in World Wide Broadcast Network AVideo
AVideo versions prior to 20.1 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.
AI Analysis
Technical Summary
CVE-2025-34439 is an open redirect vulnerability identified in the AVideo platform developed by World Wide Broadcast Network, affecting versions prior to 20.1. The root cause is the lack of proper validation of the cancelUri parameter during the user login process. This parameter is intended to redirect users after login cancellation, but due to insufficient checks, an attacker can manipulate it to redirect users to arbitrary external websites. Such open redirect flaws are commonly exploited in phishing attacks, where malicious actors craft URLs that appear legitimate but redirect victims to fraudulent sites designed to steal credentials or deliver malware. The vulnerability requires no authentication but does require user interaction, as the victim must click on the crafted link. The CVSS 4.0 vector indicates low attack complexity, no privileges required, and user interaction necessary, with limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, suggesting the vulnerability is newly disclosed or not yet weaponized. The absence of patch links implies that a fixed version (20.1 or later) is available but not explicitly referenced here. This vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site), a common web security issue that can undermine user trust and facilitate social engineering attacks.
Potential Impact
For European organizations, especially those utilizing AVideo for internal or public video streaming services, this vulnerability can be leveraged to conduct targeted phishing campaigns. Attackers can exploit the open redirect to lure users into visiting malicious websites that may harvest credentials, distribute malware, or perform other fraudulent activities. This can lead to compromised user accounts, data breaches, and reputational damage. The impact is primarily on user trust and confidentiality rather than system integrity or availability. Organizations in sectors with high reliance on video content delivery, such as media, education, and corporate communications, face increased risk. Additionally, phishing attacks exploiting this vulnerability could serve as initial access vectors for more sophisticated intrusions. The medium severity rating reflects the moderate risk, given the need for user interaction and the limited direct impact on core systems.
Mitigation Recommendations
1. Upgrade AVideo installations to version 20.1 or later where this vulnerability is addressed. 2. Implement strict validation or whitelisting of redirect URLs in the cancelUri parameter to ensure only trusted internal URLs are allowed. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. 4. Conduct user awareness training focused on recognizing phishing attempts and suspicious URLs, emphasizing caution with links received via email or messaging platforms. 5. Monitor logs for unusual redirect activity or spikes in login cancellations that may indicate exploitation attempts. 6. If upgrading immediately is not feasible, consider temporarily disabling or restricting the use of the cancelUri parameter. 7. Collaborate with security teams to perform penetration testing and vulnerability assessments on AVideo deployments to identify and remediate related issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-34439: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in World Wide Broadcast Network AVideo
Description
AVideo versions prior to 20.1 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-34439 is an open redirect vulnerability identified in the AVideo platform developed by World Wide Broadcast Network, affecting versions prior to 20.1. The root cause is the lack of proper validation of the cancelUri parameter during the user login process. This parameter is intended to redirect users after login cancellation, but due to insufficient checks, an attacker can manipulate it to redirect users to arbitrary external websites. Such open redirect flaws are commonly exploited in phishing attacks, where malicious actors craft URLs that appear legitimate but redirect victims to fraudulent sites designed to steal credentials or deliver malware. The vulnerability requires no authentication but does require user interaction, as the victim must click on the crafted link. The CVSS 4.0 vector indicates low attack complexity, no privileges required, and user interaction necessary, with limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, suggesting the vulnerability is newly disclosed or not yet weaponized. The absence of patch links implies that a fixed version (20.1 or later) is available but not explicitly referenced here. This vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site), a common web security issue that can undermine user trust and facilitate social engineering attacks.
Potential Impact
For European organizations, especially those utilizing AVideo for internal or public video streaming services, this vulnerability can be leveraged to conduct targeted phishing campaigns. Attackers can exploit the open redirect to lure users into visiting malicious websites that may harvest credentials, distribute malware, or perform other fraudulent activities. This can lead to compromised user accounts, data breaches, and reputational damage. The impact is primarily on user trust and confidentiality rather than system integrity or availability. Organizations in sectors with high reliance on video content delivery, such as media, education, and corporate communications, face increased risk. Additionally, phishing attacks exploiting this vulnerability could serve as initial access vectors for more sophisticated intrusions. The medium severity rating reflects the moderate risk, given the need for user interaction and the limited direct impact on core systems.
Mitigation Recommendations
1. Upgrade AVideo installations to version 20.1 or later where this vulnerability is addressed. 2. Implement strict validation or whitelisting of redirect URLs in the cancelUri parameter to ensure only trusted internal URLs are allowed. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. 4. Conduct user awareness training focused on recognizing phishing attempts and suspicious URLs, emphasizing caution with links received via email or messaging platforms. 5. Monitor logs for unusual redirect activity or spikes in login cancellations that may indicate exploitation attempts. 6. If upgrading immediately is not feasible, consider temporarily disabling or restricting the use of the cancelUri parameter. 7. Collaborate with security teams to perform penetration testing and vulnerability assessments on AVideo deployments to identify and remediate related issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.601Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694309ba0b6f32e62bf653cb
Added to database: 12/17/2025, 7:51:22 PM
Last enriched: 12/24/2025, 8:19:05 PM
Last updated: 2/5/2026, 7:56:50 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10258: Vulnerability in Nokia Infinera DNA
HighCVE-2026-1268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds Dynamic Widget Content
MediumCVE-2026-1246: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
MediumCVE-2026-0867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in catchthemes Essential Widgets
MediumCVE-2025-15080: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.