Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-39599: URL Redirection to Untrusted Site ('Open Redirect') in Webilia Inc. Listdom

0
Unknown
VulnerabilityCVE-2025-39599cvecve-2025-39599
Published: Wed Apr 16 2025 (04/16/2025, 12:44:16 UTC)
Source: CVE Database V5
Vendor/Project: Webilia Inc.
Product: Listdom

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Webilia Inc. Listdom listdom allows Phishing.This issue affects Listdom: from n/a through <= 4.0.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:15:28 UTC

Technical Analysis

CVE-2025-39599 identifies an Open Redirect vulnerability in Webilia Inc.'s Listdom software, versions up to and including 4.0.0. Open Redirect vulnerabilities occur when a web application accepts a user-controlled input that specifies a URL to which the application redirects the user, without sufficient validation. In this case, Listdom improperly validates redirect URLs, allowing attackers to craft malicious links that appear legitimate but redirect victims to untrusted external sites. Such redirects are commonly exploited in phishing campaigns, where attackers lure users into visiting fraudulent websites designed to steal credentials, distribute malware, or conduct other malicious activities. The vulnerability does not require authentication, meaning any user or attacker can exploit it by sending a specially crafted URL. No user interaction beyond clicking the link is necessary, increasing the risk of successful exploitation. Although no public exploits or patches are currently available, the vulnerability's presence in a widely used email list management tool raises concerns about potential phishing campaigns targeting organizations relying on Listdom. The lack of a CVSS score indicates this is a newly published vulnerability, and the absence of patches suggests immediate mitigation steps are necessary. The vulnerability affects the confidentiality and integrity of user data by enabling phishing attacks that can lead to credential compromise and unauthorized access.

Potential Impact

The primary impact of CVE-2025-39599 is the facilitation of phishing attacks through trusted domains running vulnerable Listdom instances. Attackers can exploit the open redirect to deceive users into visiting malicious websites, potentially leading to credential theft, malware infection, or further social engineering attacks. This undermines user trust in the affected organizations and can result in data breaches, financial loss, and reputational damage. Since Listdom is used for managing email lists, compromised redirects may be embedded in legitimate communications, increasing the likelihood of successful phishing. The vulnerability affects the confidentiality and integrity of user information and may indirectly impact availability if subsequent attacks disrupt services. Organizations worldwide that use Listdom for email marketing or communication are at risk, particularly those with large user bases or sensitive data. The ease of exploitation and lack of required authentication make this vulnerability a significant threat vector for cybercriminals.

Mitigation Recommendations

Organizations should immediately review their use of Listdom software and identify all instances running version 4.0.0 or earlier. Since no official patches are currently available, administrators should implement the following mitigations: 1) Disable or restrict URL redirection features within Listdom where possible, especially those accepting user input for redirect URLs. 2) Implement web application firewall (WAF) rules to detect and block suspicious redirect parameters or patterns indicative of open redirect exploitation. 3) Educate users and recipients of Listdom-managed communications about the risks of clicking unexpected links and encourage verification of URLs before clicking. 4) Monitor logs for unusual redirect activity or spikes in redirected traffic to untrusted domains. 5) Consider deploying URL rewriting or validation proxies that enforce strict allowlists for redirect destinations. 6) Stay alert for official patches or updates from Webilia Inc. and apply them promptly once released. 7) Conduct phishing simulations and awareness training to reduce the risk of successful social engineering leveraging this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:27:02.093Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd740de6bfc5ba1def4fa5

Added to database: 4/1/2026, 7:37:49 PM

Last enriched: 4/2/2026, 4:15:28 AM

Last updated: 4/4/2026, 8:22:47 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses