CVE-2025-35059: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Newforma Project Center
CVE-2025-35059 is an open redirect vulnerability in Newforma Project Center's Info Exchange component, specifically in the '/DownloadWeb/hyperlinkredirect. aspx' endpoint. The vulnerability allows unauthenticated attackers to craft URLs with the 'nhl' parameter that redirect users to untrusted external sites. This can facilitate phishing attacks or redirect users to malicious domains. The vulnerability has a CVSS score of 4. 3 (medium severity), requires no authentication, but does require user interaction to follow the malicious link. There is no known exploit in the wild and no patches currently available. The impact primarily affects user trust and integrity rather than confidentiality or availability. European organizations using Newforma Project Center should be cautious, especially those in construction and project management sectors where this software is used. Mitigations include user education, monitoring for suspicious URLs, and implementing web filtering or URL validation at the application or network level.
AI Analysis
Technical Summary
CVE-2025-35059 is an open redirect vulnerability classified under CWE-601 found in Newforma Project Center's Info Exchange (NIX) module. The vulnerability exists in the '/DownloadWeb/hyperlinkredirect.aspx' endpoint, which accepts a parameter named 'nhl' that controls the redirection target URL. Because the redirect is unauthenticated and lacks proper validation or sanitization of the 'nhl' parameter, an attacker can craft a URL that appears to originate from the legitimate Newforma domain but redirects users to arbitrary external websites. This type of vulnerability is often exploited in phishing campaigns to trick users into visiting malicious sites while appearing to come from a trusted source. The CVSS 3.1 score of 4.3 reflects a medium severity level, indicating that while the vulnerability does not directly compromise confidentiality or availability, it can impact integrity by misleading users. Exploitation requires user interaction, such as clicking on a malicious link. No authentication or privileges are required to exploit this vulnerability, increasing its accessibility to attackers. Currently, there are no known public exploits or patches available, indicating that organizations should proactively implement mitigations. The vulnerability affects all versions of Newforma Project Center as indicated, suggesting a broad exposure for users of this product. Given Newforma's focus on project management and construction industries, the threat is particularly relevant to organizations in these sectors.
Potential Impact
For European organizations, the primary impact of CVE-2025-35059 is the potential for social engineering and phishing attacks leveraging trusted Newforma URLs to redirect users to malicious sites. This can lead to credential theft, malware infections, or further exploitation via drive-by downloads. Although the vulnerability does not directly expose sensitive data or disrupt service availability, the loss of user trust and the risk of secondary attacks can have significant operational and reputational consequences. Organizations relying on Newforma Project Center for project collaboration and document management may see increased risk of targeted phishing campaigns against employees, contractors, or partners. The medium severity rating reflects that the vulnerability is not critical but still poses a meaningful risk, especially in environments where users may be less security-aware or where phishing defenses are weak. The lack of authentication requirement means attackers can exploit this vulnerability externally without insider access. The absence of known exploits in the wild provides a window for mitigation before active exploitation occurs.
Mitigation Recommendations
1. Implement strict URL validation and sanitization on the 'nhl' parameter within Newforma Project Center if possible, or request a patch from the vendor as soon as it becomes available. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious redirect attempts involving the vulnerable endpoint. 3. Educate users and employees about the risks of clicking on unexpected or suspicious links, especially those appearing to originate from internal project management tools. 4. Use email and web filtering solutions to detect and block phishing attempts that leverage the open redirect vulnerability. 5. Monitor logs for unusual redirect URL patterns or spikes in traffic to the vulnerable endpoint. 6. Consider network-level controls to restrict outbound connections to untrusted domains from user workstations. 7. Coordinate with Newforma support and subscribe to vendor advisories to receive updates on patches or workarounds. 8. If feasible, temporarily disable or restrict access to the '/DownloadWeb/hyperlinkredirect.aspx' endpoint until a fix is applied.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-35059: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Newforma Project Center
Description
CVE-2025-35059 is an open redirect vulnerability in Newforma Project Center's Info Exchange component, specifically in the '/DownloadWeb/hyperlinkredirect. aspx' endpoint. The vulnerability allows unauthenticated attackers to craft URLs with the 'nhl' parameter that redirect users to untrusted external sites. This can facilitate phishing attacks or redirect users to malicious domains. The vulnerability has a CVSS score of 4. 3 (medium severity), requires no authentication, but does require user interaction to follow the malicious link. There is no known exploit in the wild and no patches currently available. The impact primarily affects user trust and integrity rather than confidentiality or availability. European organizations using Newforma Project Center should be cautious, especially those in construction and project management sectors where this software is used. Mitigations include user education, monitoring for suspicious URLs, and implementing web filtering or URL validation at the application or network level.
AI-Powered Analysis
Technical Analysis
CVE-2025-35059 is an open redirect vulnerability classified under CWE-601 found in Newforma Project Center's Info Exchange (NIX) module. The vulnerability exists in the '/DownloadWeb/hyperlinkredirect.aspx' endpoint, which accepts a parameter named 'nhl' that controls the redirection target URL. Because the redirect is unauthenticated and lacks proper validation or sanitization of the 'nhl' parameter, an attacker can craft a URL that appears to originate from the legitimate Newforma domain but redirects users to arbitrary external websites. This type of vulnerability is often exploited in phishing campaigns to trick users into visiting malicious sites while appearing to come from a trusted source. The CVSS 3.1 score of 4.3 reflects a medium severity level, indicating that while the vulnerability does not directly compromise confidentiality or availability, it can impact integrity by misleading users. Exploitation requires user interaction, such as clicking on a malicious link. No authentication or privileges are required to exploit this vulnerability, increasing its accessibility to attackers. Currently, there are no known public exploits or patches available, indicating that organizations should proactively implement mitigations. The vulnerability affects all versions of Newforma Project Center as indicated, suggesting a broad exposure for users of this product. Given Newforma's focus on project management and construction industries, the threat is particularly relevant to organizations in these sectors.
Potential Impact
For European organizations, the primary impact of CVE-2025-35059 is the potential for social engineering and phishing attacks leveraging trusted Newforma URLs to redirect users to malicious sites. This can lead to credential theft, malware infections, or further exploitation via drive-by downloads. Although the vulnerability does not directly expose sensitive data or disrupt service availability, the loss of user trust and the risk of secondary attacks can have significant operational and reputational consequences. Organizations relying on Newforma Project Center for project collaboration and document management may see increased risk of targeted phishing campaigns against employees, contractors, or partners. The medium severity rating reflects that the vulnerability is not critical but still poses a meaningful risk, especially in environments where users may be less security-aware or where phishing defenses are weak. The lack of authentication requirement means attackers can exploit this vulnerability externally without insider access. The absence of known exploits in the wild provides a window for mitigation before active exploitation occurs.
Mitigation Recommendations
1. Implement strict URL validation and sanitization on the 'nhl' parameter within Newforma Project Center if possible, or request a patch from the vendor as soon as it becomes available. 2. Deploy web application firewalls (WAFs) with custom rules to detect and block suspicious redirect attempts involving the vulnerable endpoint. 3. Educate users and employees about the risks of clicking on unexpected or suspicious links, especially those appearing to originate from internal project management tools. 4. Use email and web filtering solutions to detect and block phishing attempts that leverage the open redirect vulnerability. 5. Monitor logs for unusual redirect URL patterns or spikes in traffic to the vulnerable endpoint. 6. Consider network-level controls to restrict outbound connections to untrusted domains from user workstations. 7. Coordinate with Newforma support and subscribe to vendor advisories to receive updates on patches or workarounds. 8. If feasible, temporarily disable or restrict access to the '/DownloadWeb/hyperlinkredirect.aspx' endpoint until a fix is applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.406Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e81d26ba0e608b4fac9446
Added to database: 10/9/2025, 8:37:58 PM
Last enriched: 10/17/2025, 5:19:20 AM
Last updated: 11/25/2025, 2:13:08 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-41419: n/a
UnknownCVE-2025-9803: CWE-287 Improper Authentication in lunary-ai lunary-ai/lunary
CriticalCVE-2025-65951: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in mescuwa entropy-derby
HighCVE-2025-65944: CWE-201: Insertion of Sensitive Information Into Sent Data in getsentry sentry-javascript
MediumCVE-2025-65018: CWE-787: Out-of-bounds Write in pnggroup libpng
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.