CVE-2025-58067: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in basecamp google_sign_in
Basecamp's Google Sign-In adds Google sign-in to Rails applications. Prior to version 1.3.1, it is possible to redirect a user to another origin if the "proceed_to" value in the session store is set to a protocol-relative URL. Normally the value of this URL is only written and read by the library or the calling application. However, it may be possible to set this session value from a malicious site with a form submission. Any Rails applications using the google_sign_in gem may be vulnerable, if this vector can be chained with another attack that is able to modify the OAuth2 request parameters. This issue has been patched in version 1.3.1. There are no workarounds.
AI Analysis
Technical Summary
CVE-2025-58067 is a medium-severity vulnerability classified as CWE-601 (URL Redirection to Untrusted Site, also known as an Open Redirect) affecting the Basecamp google_sign_in gem used in Ruby on Rails applications. This gem facilitates Google Sign-In integration for Rails apps. The vulnerability exists in versions prior to 1.3.1, where the "proceed_to" value stored in the session can be set to a protocol-relative URL, allowing an attacker to redirect users to arbitrary external origins. Normally, this session value is managed internally by the library or the hosting application, but it may be manipulated via a form submission from a malicious site. Exploitation requires chaining this open redirect with another attack vector capable of modifying OAuth2 request parameters, which increases the complexity of exploitation. The vulnerability does not require authentication but does require user interaction (e.g., clicking a crafted link or submitting a form). The CVSS 3.1 base score is 4.2 (medium), reflecting network attack vector, high attack complexity, no privileges required, user interaction required, and low impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. The issue was patched in version 1.3.1 of the google_sign_in gem, and no workarounds exist, so upgrading is mandatory to remediate the risk.
Potential Impact
For European organizations using Ruby on Rails applications that integrate Google Sign-In via the vulnerable versions of the basecamp google_sign_in gem, this vulnerability could enable attackers to redirect users to malicious websites. This could facilitate phishing attacks, credential theft, or drive-by downloads by exploiting user trust in the legitimate application domain. Although the direct impact on confidentiality and integrity is rated low, the open redirect can be a critical component in multi-stage attacks, especially if combined with other OAuth2 parameter manipulation vulnerabilities. This could lead to unauthorized access or session hijacking in worst-case scenarios. The impact is particularly relevant for sectors with high reliance on web applications for user authentication, such as financial services, e-government portals, and healthcare providers in Europe. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in widely used authentication components necessitates prompt remediation to prevent potential exploitation.
Mitigation Recommendations
The only effective mitigation is to upgrade the google_sign_in gem to version 1.3.1 or later, where the vulnerability has been patched. Since no workarounds exist, organizations should prioritize dependency management and patching processes to ensure timely updates. Additionally, developers should audit OAuth2 request parameter handling to prevent manipulation that could be chained with this open redirect. Implementing strict validation and whitelisting of redirect URLs within the application can further reduce risk. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns or unusual OAuth2 parameter modifications. User education on phishing risks and monitoring for unusual authentication flows can also help mitigate exploitation attempts. Finally, organizations should conduct security testing and code reviews focusing on session management and redirect handling in authentication flows.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-58067: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in basecamp google_sign_in
Description
Basecamp's Google Sign-In adds Google sign-in to Rails applications. Prior to version 1.3.1, it is possible to redirect a user to another origin if the "proceed_to" value in the session store is set to a protocol-relative URL. Normally the value of this URL is only written and read by the library or the calling application. However, it may be possible to set this session value from a malicious site with a form submission. Any Rails applications using the google_sign_in gem may be vulnerable, if this vector can be chained with another attack that is able to modify the OAuth2 request parameters. This issue has been patched in version 1.3.1. There are no workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2025-58067 is a medium-severity vulnerability classified as CWE-601 (URL Redirection to Untrusted Site, also known as an Open Redirect) affecting the Basecamp google_sign_in gem used in Ruby on Rails applications. This gem facilitates Google Sign-In integration for Rails apps. The vulnerability exists in versions prior to 1.3.1, where the "proceed_to" value stored in the session can be set to a protocol-relative URL, allowing an attacker to redirect users to arbitrary external origins. Normally, this session value is managed internally by the library or the hosting application, but it may be manipulated via a form submission from a malicious site. Exploitation requires chaining this open redirect with another attack vector capable of modifying OAuth2 request parameters, which increases the complexity of exploitation. The vulnerability does not require authentication but does require user interaction (e.g., clicking a crafted link or submitting a form). The CVSS 3.1 base score is 4.2 (medium), reflecting network attack vector, high attack complexity, no privileges required, user interaction required, and low impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild. The issue was patched in version 1.3.1 of the google_sign_in gem, and no workarounds exist, so upgrading is mandatory to remediate the risk.
Potential Impact
For European organizations using Ruby on Rails applications that integrate Google Sign-In via the vulnerable versions of the basecamp google_sign_in gem, this vulnerability could enable attackers to redirect users to malicious websites. This could facilitate phishing attacks, credential theft, or drive-by downloads by exploiting user trust in the legitimate application domain. Although the direct impact on confidentiality and integrity is rated low, the open redirect can be a critical component in multi-stage attacks, especially if combined with other OAuth2 parameter manipulation vulnerabilities. This could lead to unauthorized access or session hijacking in worst-case scenarios. The impact is particularly relevant for sectors with high reliance on web applications for user authentication, such as financial services, e-government portals, and healthcare providers in Europe. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in widely used authentication components necessitates prompt remediation to prevent potential exploitation.
Mitigation Recommendations
The only effective mitigation is to upgrade the google_sign_in gem to version 1.3.1 or later, where the vulnerability has been patched. Since no workarounds exist, organizations should prioritize dependency management and patching processes to ensure timely updates. Additionally, developers should audit OAuth2 request parameter handling to prevent manipulation that could be chained with this open redirect. Implementing strict validation and whitelisting of redirect URLs within the application can further reduce risk. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns or unusual OAuth2 parameter modifications. User education on phishing risks and monitoring for unusual authentication flows can also help mitigate exploitation attempts. Finally, organizations should conduct security testing and code reviews focusing on session management and redirect handling in authentication flows.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-22T14:30:32.222Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b218fcad5a09ad007b7a27
Added to database: 8/29/2025, 9:17:48 PM
Last enriched: 9/7/2025, 12:44:47 AM
Last updated: 10/14/2025, 11:44:08 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54196: URL Redirection to Untrusted Site ('Open Redirect') (CWE-601) in Adobe Adobe Connect
LowCVE-2025-49553: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
CriticalCVE-2025-49552: Cross-site Scripting (DOM-based XSS) (CWE-79) in Adobe Adobe Connect
HighCVE-2025-62376: CWE-287: Improper Authentication in pwncollege dojo
CriticalCVE-2025-61797: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.