Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61587: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in WeblateOrg weblate

0
Low
VulnerabilityCVE-2025-61587cvecve-2025-61587cwe-601cwe-1395
Published: Wed Oct 01 2025 (10/01/2025, 22:01:00 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

Weblate is a web based localization tool. An open redirect exists in versions 5.13.2 and below via the redir parameter on .within.website when Weblate is configured with Anubis and REDIRECT_DOMAINS is not set. An attacker can craft a URL on the legitimate domain that redirects a victim to an attacker-controlled site. The redirect can also be used to initiate drive-by downloads (redirecting to a URL that serves a malicious file), increasing the risk to end users. This issue is fixed in version 5.13.3.

AI-Powered Analysis

AILast updated: 10/08/2025, 22:07:43 UTC

Technical Analysis

CVE-2025-61587 is an open redirect vulnerability identified in Weblate, a web-based localization platform widely used for software translation management. The flaw exists in versions 5.13.2 and earlier when Weblate is configured with the Anubis backend and the REDIRECT_DOMAINS setting is not defined. The vulnerability arises from insufficient validation of the 'redir' parameter on the .within.website domain, allowing attackers to craft URLs that appear legitimate but redirect victims to attacker-controlled websites. This can facilitate social engineering attacks such as phishing or drive-by downloads by redirecting users to malicious payloads hosted externally. The vulnerability does not require authentication but does require user interaction to follow the crafted URL. The CVSS 4.0 base score is 2.1, reflecting low severity due to limited impact on confidentiality, integrity, and availability, and the absence of direct system compromise. No known exploits are reported in the wild as of publication. The issue is resolved in Weblate version 5.13.3, which includes proper validation and configuration options to restrict redirect domains. The vulnerability is categorized under CWE-601 (Open Redirect) and CWE-1395 (Improper Input Validation).

Potential Impact

For European organizations, the primary risk lies in the potential for phishing and social engineering attacks leveraging trusted Weblate URLs to redirect users to malicious sites. This could lead to credential theft, malware infections, or drive-by downloads, particularly affecting employees involved in localization or software development workflows. While the vulnerability does not allow direct compromise of Weblate servers or data, the reputational damage and operational disruption from successful phishing campaigns could be significant. Organizations relying heavily on Weblate for localization, especially those integrating it into critical development pipelines, may face increased risk. The low CVSS score indicates limited direct technical impact, but the human factor risk remains relevant. Additionally, if attackers combine this vulnerability with other exploits, the overall threat could escalate. The absence of known exploits reduces immediate urgency but does not eliminate risk.

Mitigation Recommendations

European organizations should immediately upgrade Weblate installations to version 5.13.3 or later to remediate the vulnerability. If upgrading is not immediately feasible, administrators should configure the REDIRECT_DOMAINS setting to explicitly whitelist trusted domains, preventing arbitrary redirects. Implement strict URL validation and sanitization on any user-controllable redirect parameters. Educate users about the risks of clicking on unexpected or suspicious links, especially those appearing to originate from trusted internal tools. Employ web security gateways or URL filtering solutions to detect and block known malicious redirect destinations. Monitor Weblate logs for unusual redirect parameter usage or spikes in redirect traffic. Integrate multi-factor authentication and endpoint protection to reduce the impact of potential phishing or malware delivery. Finally, maintain an incident response plan that includes phishing detection and user awareness training tailored to localization and development teams.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-26T16:25:25.150Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dda589b3e3ddcc713a4ba5

Added to database: 10/1/2025, 10:04:57 PM

Last enriched: 10/8/2025, 10:07:43 PM

Last updated: 11/16/2025, 7:50:45 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats