Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58067: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in basecamp google_sign_in

0
Medium
VulnerabilityCVE-2025-58067cvecve-2025-58067cwe-601
Published: Fri Aug 29 2025 (08/29/2025, 21:05:22 UTC)
Source: CVE Database V5
Vendor/Project: basecamp
Product: google_sign_in

Description

Basecamp's Google Sign-In adds Google sign-in to Rails applications. Prior to version 1.3.1, it is possible to redirect a user to another origin if the "proceed_to" value in the session store is set to a protocol-relative URL. Normally the value of this URL is only written and read by the library or the calling application. However, it may be possible to set this session value from a malicious site with a form submission. Any Rails applications using the google_sign_in gem may be vulnerable, if this vector can be chained with another attack that is able to modify the OAuth2 request parameters. This issue has been patched in version 1.3.1. There are no workarounds.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:44:47 UTC

Technical Analysis

CVE-2025-58067 is a medium-severity vulnerability classified as CWE-601 (URL Redirection to Untrusted Site, also known as an Open Redirect) affecting the Basecamp google_sign_in gem used in Ruby on Rails applications. This gem facilitates Google Sign-In integration for Rails apps. The vulnerability exists in versions prior to 1.3.1, where the "proceed_to" value stored in the session can be set to a protocol-relative URL, allowing an attacker to redirect users to arbitrary external origins. Normally, this session value is managed internally by the library or the hosting application, but it may be manipulated via a form submission from a malicious site. Exploitation requires chaining this open redirect with another attack vector capable of modifying OAuth2 request parameters, which increases the complexity of exploitation. The vulnerability does not require authentication but does require user interaction (e.g., clicking a crafted link or submitting a form). The CVSS 3.1 base score is 4.2 (medium), reflecting network attack vector, high attack complexity, no privileges required, user interaction required, and low impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. The issue was patched in version 1.3.1 of the google_sign_in gem, and no workarounds exist, so upgrading is mandatory to remediate the risk.

Potential Impact

For European organizations using Ruby on Rails applications that integrate Google Sign-In via the vulnerable versions of the basecamp google_sign_in gem, this vulnerability could enable attackers to redirect users to malicious websites. This could facilitate phishing attacks, credential theft, or drive-by downloads by exploiting user trust in the legitimate application domain. Although the direct impact on confidentiality and integrity is rated low, the open redirect can be a critical component in multi-stage attacks, especially if combined with other OAuth2 parameter manipulation vulnerabilities. This could lead to unauthorized access or session hijacking in worst-case scenarios. The impact is particularly relevant for sectors with high reliance on web applications for user authentication, such as financial services, e-government portals, and healthcare providers in Europe. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in widely used authentication components necessitates prompt remediation to prevent potential exploitation.

Mitigation Recommendations

The only effective mitigation is to upgrade the google_sign_in gem to version 1.3.1 or later, where the vulnerability has been patched. Since no workarounds exist, organizations should prioritize dependency management and patching processes to ensure timely updates. Additionally, developers should audit OAuth2 request parameter handling to prevent manipulation that could be chained with this open redirect. Implementing strict validation and whitelisting of redirect URLs within the application can further reduce risk. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns or unusual OAuth2 parameter modifications. User education on phishing risks and monitoring for unusual authentication flows can also help mitigate exploitation attempts. Finally, organizations should conduct security testing and code reviews focusing on session management and redirect handling in authentication flows.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-22T14:30:32.222Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b218fcad5a09ad007b7a27

Added to database: 8/29/2025, 9:17:48 PM

Last enriched: 9/7/2025, 12:44:47 AM

Last updated: 10/14/2025, 11:44:08 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats