CVE-2025-34504: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in kodcloud KodExplorer
KodExplorer 4.52 contains an open redirect vulnerability in the user login page that allows attackers to manipulate the 'link' parameter. Attackers can craft malicious URLs in the link parameter to redirect users to arbitrary external websites after authentication.
AI Analysis
Technical Summary
CVE-2025-34504 identifies an open redirect vulnerability (CWE-601) in KodExplorer version 4.52, a web-based file management and collaboration platform developed by kodcloud. The vulnerability exists on the user login page where the 'link' parameter is used to redirect users after authentication. Due to insufficient validation or sanitization of this parameter, attackers can craft malicious URLs embedding arbitrary external destinations. When a user clicks such a URL and successfully authenticates, they are redirected to the attacker-controlled site. This can be leveraged for phishing campaigns, credential harvesting, or delivering malware by exploiting user trust in the legitimate KodExplorer domain. The vulnerability does not require any privileges or authentication to exploit, but user interaction is necessary. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:P/VC:L/VI:L/VA:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, and low impact on confidentiality and integrity. No patches or official fixes have been published as of the vulnerability disclosure date (December 11, 2025), and no active exploitation has been reported. KodExplorer is used globally, including in European organizations for internal file sharing and collaboration, making this vulnerability relevant for enterprise security teams. The lack of authentication requirement and ease of exploitation through crafted URLs make this a moderate risk that could facilitate social engineering and phishing attacks targeting users of the affected software.
Potential Impact
For European organizations, this vulnerability can lead to increased phishing and social engineering risks by redirecting authenticated users to malicious external websites. This can result in credential theft, malware infections, or unauthorized data access if users are tricked into submitting sensitive information or downloading malicious payloads. While the vulnerability does not directly compromise the KodExplorer system or its data, the indirect impact on user trust and potential downstream attacks can be significant. Organizations relying on KodExplorer 4.52 for file management and collaboration may face reputational damage and operational disruptions if attackers exploit this flaw to compromise user accounts or spread malware. The medium severity reflects the moderate impact on confidentiality and integrity, with no direct availability impact. However, the ease of exploitation and lack of required privileges make it a practical vector for attackers targeting European enterprises, especially those with less mature user awareness or insufficient URL filtering controls.
Mitigation Recommendations
1. Implement strict validation and sanitization of the 'link' parameter on the login page to ensure redirection only occurs to trusted internal URLs or whitelisted domains. 2. Apply URL allowlisting or domain restrictions within KodExplorer configuration or via web application firewalls (WAFs) to block external redirects. 3. Educate users to recognize suspicious URLs and avoid clicking on unexpected or unsolicited links, especially those purporting to be from KodExplorer. 4. Monitor web server logs for unusual redirect patterns or repeated access to the login page with manipulated 'link' parameters. 5. If possible, upgrade to a patched version of KodExplorer once available or apply vendor-provided mitigations. 6. Employ email and web gateway filtering to detect and block phishing attempts leveraging this vulnerability. 7. Consider implementing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing attacks. 8. Conduct regular security awareness training focused on phishing and social engineering threats related to URL redirection.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-34504: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in kodcloud KodExplorer
Description
KodExplorer 4.52 contains an open redirect vulnerability in the user login page that allows attackers to manipulate the 'link' parameter. Attackers can craft malicious URLs in the link parameter to redirect users to arbitrary external websites after authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-34504 identifies an open redirect vulnerability (CWE-601) in KodExplorer version 4.52, a web-based file management and collaboration platform developed by kodcloud. The vulnerability exists on the user login page where the 'link' parameter is used to redirect users after authentication. Due to insufficient validation or sanitization of this parameter, attackers can craft malicious URLs embedding arbitrary external destinations. When a user clicks such a URL and successfully authenticates, they are redirected to the attacker-controlled site. This can be leveraged for phishing campaigns, credential harvesting, or delivering malware by exploiting user trust in the legitimate KodExplorer domain. The vulnerability does not require any privileges or authentication to exploit, but user interaction is necessary. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:P/VC:L/VI:L/VA:N) indicates network attack vector, low attack complexity, no privileges required, user interaction required, and low impact on confidentiality and integrity. No patches or official fixes have been published as of the vulnerability disclosure date (December 11, 2025), and no active exploitation has been reported. KodExplorer is used globally, including in European organizations for internal file sharing and collaboration, making this vulnerability relevant for enterprise security teams. The lack of authentication requirement and ease of exploitation through crafted URLs make this a moderate risk that could facilitate social engineering and phishing attacks targeting users of the affected software.
Potential Impact
For European organizations, this vulnerability can lead to increased phishing and social engineering risks by redirecting authenticated users to malicious external websites. This can result in credential theft, malware infections, or unauthorized data access if users are tricked into submitting sensitive information or downloading malicious payloads. While the vulnerability does not directly compromise the KodExplorer system or its data, the indirect impact on user trust and potential downstream attacks can be significant. Organizations relying on KodExplorer 4.52 for file management and collaboration may face reputational damage and operational disruptions if attackers exploit this flaw to compromise user accounts or spread malware. The medium severity reflects the moderate impact on confidentiality and integrity, with no direct availability impact. However, the ease of exploitation and lack of required privileges make it a practical vector for attackers targeting European enterprises, especially those with less mature user awareness or insufficient URL filtering controls.
Mitigation Recommendations
1. Implement strict validation and sanitization of the 'link' parameter on the login page to ensure redirection only occurs to trusted internal URLs or whitelisted domains. 2. Apply URL allowlisting or domain restrictions within KodExplorer configuration or via web application firewalls (WAFs) to block external redirects. 3. Educate users to recognize suspicious URLs and avoid clicking on unexpected or unsolicited links, especially those purporting to be from KodExplorer. 4. Monitor web server logs for unusual redirect patterns or repeated access to the login page with manipulated 'link' parameters. 5. If possible, upgrade to a patched version of KodExplorer once available or apply vendor-provided mitigations. 6. Employ email and web gateway filtering to detect and block phishing attempts leveraging this vulnerability. 7. Consider implementing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing attacks. 8. Conduct regular security awareness training focused on phishing and social engineering threats related to URL redirection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.611Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693b3df122246175c6a4708e
Added to database: 12/11/2025, 9:56:01 PM
Last enriched: 12/11/2025, 10:14:04 PM
Last updated: 12/13/2025, 6:47:55 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14586: OS Command Injection in TOTOLINK X5000R
MediumCVE-2025-10738: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in rupok98 URL Shortener Plugin For WordPress
CriticalCVE-2025-9116: CWE-79 Cross-Site Scripting (XSS) in WPS Visitor Counter Plugin
MediumCVE-2025-12362: CWE-862 Missing Authorization in saadiqbal myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program.
MediumCVE-2025-9873: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in a3rev a3 Lazy Load
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.