Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60868: n/a

0
Medium
VulnerabilityCVE-2025-60868cvecve-2025-60868
Published: Fri Oct 10 2025 (10/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Alt Redirect 1.6.3 addon for Statamic fails to consistently strip query string parameters when the "Query String Strip" feature is enabled. Case variations, encoded keys, and duplicates are not removed, allowing attackers to bypass sanitization. This may lead to cache poisoning, parameter pollution, or denial of service.

AI-Powered Analysis

AILast updated: 10/10/2025, 14:04:20 UTC

Technical Analysis

The vulnerability identified as CVE-2025-60868 affects the Alt Redirect 1.6.3 addon for the Statamic content management system. This addon includes a feature called "Query String Strip" intended to sanitize and remove query string parameters from URLs to prevent malicious manipulation. However, the addon fails to consistently strip parameters when faced with case variations (e.g., uppercase vs lowercase keys), encoded keys (URL-encoded characters), and duplicate parameters. This inconsistency allows attackers to bypass the sanitization process, meaning malicious or unwanted parameters can persist in URLs. The consequences include cache poisoning, where attackers can manipulate cached content served to users; parameter pollution, which can alter application logic or cause unexpected behavior; and denial of service, potentially by overwhelming the system with malformed requests. The vulnerability does not have an assigned CVSS score and no known exploits have been reported yet. The lack of patch links suggests a fix may not be publicly available at the time of publication. The vulnerability impacts the confidentiality, integrity, and availability of affected systems by undermining input validation and caching security. Exploitation does not require authentication or user interaction, increasing the risk. The affected versions are not explicitly listed beyond the 1.6.3 addon version, but users of this specific addon version are at risk. The vulnerability is particularly relevant for organizations relying on Statamic for web content delivery and caching.

Potential Impact

For European organizations, this vulnerability poses significant risks to web infrastructure integrity and availability. Cache poisoning can lead to the delivery of malicious or stale content to users, damaging trust and potentially exposing users to further attacks. Parameter pollution may allow attackers to manipulate application behavior, potentially bypassing security controls or causing data integrity issues. Denial of service attacks could disrupt access to critical web services, impacting business continuity. Organizations with public-facing websites using Statamic and the vulnerable addon are particularly at risk. The impact extends to sectors reliant on web presence and content delivery, including e-commerce, media, and government services. Given the lack of authentication or user interaction requirements, attackers can exploit this vulnerability remotely and at scale. The absence of a patch increases the urgency for interim mitigations. Failure to address this vulnerability could result in reputational damage, regulatory scrutiny under GDPR if user data is impacted, and operational disruptions.

Mitigation Recommendations

European organizations should immediately audit their use of the Alt Redirect addon within Statamic environments to identify if version 1.6.3 or similar vulnerable versions are deployed. Until a patch is available, implement strict input validation and normalization at the web application firewall (WAF) or reverse proxy level to detect and block query strings with case variations, encoded keys, or duplicate parameters that could bypass sanitization. Employ caching mechanisms that validate cache keys rigorously to prevent poisoning. Monitor web server and application logs for unusual query string patterns or repeated malformed requests indicative of exploitation attempts. Engage with Statamic or addon maintainers to obtain updates or patches as soon as they are released. Consider temporarily disabling the "Query String Strip" feature if it cannot be secured, or replace the addon with alternative solutions that properly sanitize query parameters. Conduct penetration testing focusing on query string manipulation to verify the effectiveness of mitigations. Maintain incident response readiness to quickly address any exploitation attempts. Document all mitigation steps and communicate risks to relevant stakeholders.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e912159497c34e0b6ebdc1

Added to database: 10/10/2025, 2:03:01 PM

Last enriched: 10/10/2025, 2:04:20 PM

Last updated: 10/10/2025, 8:11:57 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats