Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34504: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in kodcloud KodExplorer

0
Medium
VulnerabilityCVE-2025-34504cvecve-2025-34504cwe-601
Published: Thu Dec 11 2025 (12/11/2025, 21:43:45 UTC)
Source: CVE Database V5
Vendor/Project: kodcloud
Product: KodExplorer

Description

KodExplorer 4.52 contains an open redirect vulnerability in the user login page that allows attackers to manipulate the 'link' parameter. Attackers can craft malicious URLs in the link parameter to redirect users to arbitrary external websites after authentication.

AI-Powered Analysis

AILast updated: 12/19/2025, 04:53:29 UTC

Technical Analysis

KodExplorer 4.52 contains an open redirect vulnerability identified as CVE-2025-34504, classified under CWE-601. The vulnerability exists in the user login page where the 'link' parameter is not properly validated or sanitized, allowing attackers to craft URLs that redirect users to arbitrary external websites after successful authentication. This flaw can be exploited by sending victims a malicious URL containing a manipulated 'link' parameter. When users click the link and log in, they are redirected to an attacker-controlled site, potentially facilitating phishing, credential theft, or malware distribution. The vulnerability does not require any privileges or authentication to exploit but does require user interaction. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality and integrity (VC:L, VI:L). No known exploits have been reported in the wild as of the publication date. KodExplorer is a web-based file management system widely used for internal file sharing and collaboration, making this vulnerability a concern for organizations relying on it for secure file access. The lack of an official patch means organizations must rely on configuration changes or other mitigations to reduce risk.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Attackers can exploit the open redirect to trick users into visiting malicious websites that may harvest credentials or deliver malware. Since KodExplorer is often used in enterprise environments for file management, successful exploitation could lead to compromised user accounts or further lateral movement if attackers gain credentials. The impact on confidentiality and integrity is indirect but significant in environments where trust in internal tools is high. Availability is not directly affected. Organizations in sectors with high regulatory scrutiny (e.g., finance, healthcare) may face compliance risks if user credentials or sensitive data are compromised. The medium CVSS score reflects the balance between ease of exploitation and limited direct system impact. However, the potential for phishing campaigns leveraging this vulnerability could increase attack surface and risk exposure.

Mitigation Recommendations

1. Immediately review and restrict the use of the 'link' parameter in the login URL. Implement strict validation or whitelist allowed redirect destinations to prevent arbitrary URLs. 2. Educate users to be cautious of unexpected login page URLs and to verify the legitimacy of links before clicking. 3. Employ web application firewalls (WAFs) to detect and block suspicious URL patterns that exploit the 'link' parameter. 4. Monitor logs for unusual redirect activities or spikes in login page access with manipulated parameters. 5. If possible, disable or remove the redirect functionality until a vendor patch is released. 6. Implement multi-factor authentication (MFA) to reduce the risk of compromised credentials from phishing. 7. Regularly update KodExplorer and subscribe to vendor advisories for patch availability. 8. Conduct phishing simulations to raise awareness among users about redirection and social engineering threats. 9. Segment the network to limit access to KodExplorer instances and sensitive data. 10. Consider alternative secure file management solutions if patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.611Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b3df122246175c6a4708e

Added to database: 12/11/2025, 9:56:01 PM

Last enriched: 12/19/2025, 4:53:29 AM

Last updated: 2/5/2026, 6:57:57 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats