Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34504: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in kodcloud KodExplorer

0
Medium
VulnerabilityCVE-2025-34504cvecve-2025-34504cwe-601
Published: Thu Dec 11 2025 (12/11/2025, 21:43:45 UTC)
Source: CVE Database V5
Vendor/Project: kodcloud
Product: KodExplorer

Description

KodExplorer 4.52 contains an open redirect vulnerability in the user login page that allows attackers to manipulate the 'link' parameter. Attackers can craft malicious URLs in the link parameter to redirect users to arbitrary external websites after authentication.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:14:04 UTC

Technical Analysis

CVE-2025-34504 identifies an open redirect vulnerability (CWE-601) in KodExplorer version 4.52, a web-based file management and collaboration platform developed by kodcloud. The vulnerability exists on the user login page where the 'link' parameter is used to redirect users after authentication. Due to insufficient validation or sanitization of this parameter, attackers can craft malicious URLs embedding arbitrary external destinations. When a user clicks such a URL and successfully authenticates, they are redirected to the attacker-controlled site. This can be leveraged for phishing campaigns, credential harvesting, or delivering malware by exploiting user trust in the legitimate KodExplorer domain. The vulnerability does not require any privileges or authentication to exploit, but user interaction is necessary. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:P/VC:L/VI:L/VA:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, and low impact on confidentiality and integrity. No patches or official fixes have been published as of the vulnerability disclosure date (December 11, 2025), and no active exploitation has been reported. KodExplorer is used globally, including in European organizations for internal file sharing and collaboration, making this vulnerability relevant for enterprise security teams. The lack of authentication requirement and ease of exploitation through crafted URLs make this a moderate risk that could facilitate social engineering and phishing attacks targeting users of the affected software.

Potential Impact

For European organizations, this vulnerability can lead to increased phishing and social engineering risks by redirecting authenticated users to malicious external websites. This can result in credential theft, malware infections, or unauthorized data access if users are tricked into submitting sensitive information or downloading malicious payloads. While the vulnerability does not directly compromise the KodExplorer system or its data, the indirect impact on user trust and potential downstream attacks can be significant. Organizations relying on KodExplorer 4.52 for file management and collaboration may face reputational damage and operational disruptions if attackers exploit this flaw to compromise user accounts or spread malware. The medium severity reflects the moderate impact on confidentiality and integrity, with no direct availability impact. However, the ease of exploitation and lack of required privileges make it a practical vector for attackers targeting European enterprises, especially those with less mature user awareness or insufficient URL filtering controls.

Mitigation Recommendations

1. Implement strict validation and sanitization of the 'link' parameter on the login page to ensure redirection only occurs to trusted internal URLs or whitelisted domains. 2. Apply URL allowlisting or domain restrictions within KodExplorer configuration or via web application firewalls (WAFs) to block external redirects. 3. Educate users to recognize suspicious URLs and avoid clicking on unexpected or unsolicited links, especially those purporting to be from KodExplorer. 4. Monitor web server logs for unusual redirect patterns or repeated access to the login page with manipulated 'link' parameters. 5. If possible, upgrade to a patched version of KodExplorer once available or apply vendor-provided mitigations. 6. Employ email and web gateway filtering to detect and block phishing attempts leveraging this vulnerability. 7. Consider implementing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing attacks. 8. Conduct regular security awareness training focused on phishing and social engineering threats related to URL redirection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.611Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693b3df122246175c6a4708e

Added to database: 12/11/2025, 9:56:01 PM

Last enriched: 12/11/2025, 10:14:04 PM

Last updated: 12/13/2025, 6:47:55 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats