Skip to main content

CVE-2025-61587: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in WeblateOrg weblate

Low
VulnerabilityCVE-2025-61587cvecve-2025-61587cwe-601cwe-1395
Published: Wed Oct 01 2025 (10/01/2025, 22:01:00 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

Weblate is a web based localization tool. An open redirect exists in versions 5.13.2 and below via the redir parameter on .within.website when Weblate is configured with Anubis and REDIRECT_DOMAINS is not set. An attacker can craft a URL on the legitimate domain that redirects a victim to an attacker-controlled site. The redirect can also be used to initiate drive-by downloads (redirecting to a URL that serves a malicious file), increasing the risk to end users. This issue is fixed in version 5.13.3.

AI-Powered Analysis

AILast updated: 10/01/2025, 22:05:14 UTC

Technical Analysis

CVE-2025-61587 is an open redirect vulnerability affecting Weblate, a web-based localization tool widely used for collaborative translation management. The vulnerability exists in versions 5.13.2 and earlier, specifically when Weblate is configured with the Anubis authentication backend and the REDIRECT_DOMAINS setting is not configured. The issue arises from improper validation of the 'redir' parameter on the legitimate Weblate domain, allowing an attacker to craft URLs that redirect users to arbitrary, attacker-controlled external websites. This can be exploited to conduct phishing attacks by luring users to malicious sites that appear to originate from a trusted domain. Additionally, the redirect can facilitate drive-by downloads by directing victims to URLs hosting malicious payloads, thereby increasing the risk of malware infection. The vulnerability does not require authentication but does require user interaction, as victims must click on the crafted URL. The CVSS 4.0 score is 2.1 (low severity), reflecting limited impact on confidentiality, integrity, and availability, and the ease of exploitation is moderate due to the need for user interaction. The issue is resolved in Weblate version 5.13.3 by properly restricting redirect targets via the REDIRECT_DOMAINS configuration, preventing redirection to untrusted domains.

Potential Impact

For European organizations using Weblate for localization and translation workflows, this vulnerability poses a risk primarily to end users who may be redirected to malicious sites, potentially leading to phishing attacks or malware infections. While the direct impact on the Weblate system's confidentiality, integrity, or availability is minimal, the reputational damage and potential compromise of user endpoints can be significant. Organizations in sectors with high reliance on multilingual content management, such as software development firms, multinational corporations, and government agencies, may be targeted to exploit trust in their legitimate Weblate domains. The risk is compounded if attackers use the vulnerability to distribute malware or harvest credentials via social engineering. However, since exploitation requires user interaction and the vulnerability is low severity, the overall threat level is moderate but should not be ignored, especially in environments with sensitive data or regulatory compliance requirements like GDPR.

Mitigation Recommendations

European organizations should upgrade all Weblate instances to version 5.13.3 or later immediately to eliminate the vulnerability. If upgrading is not immediately feasible, administrators must configure the REDIRECT_DOMAINS setting to explicitly whitelist trusted domains for redirection, thereby preventing open redirects to untrusted sites. Additionally, organizations should implement strict URL filtering and monitoring on their web gateways and email security solutions to detect and block suspicious URLs that exploit this vulnerability. User awareness training should emphasize caution when clicking on URLs, even if they appear to originate from trusted domains. Weblate administrators should audit their authentication backend configurations to ensure Anubis is used securely and review logs for unusual redirect activity. Finally, integrating Weblate with web application firewalls (WAFs) that can detect and block open redirect attempts can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-26T16:25:25.150Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dda589b3e3ddcc713a4ba5

Added to database: 10/1/2025, 10:04:57 PM

Last enriched: 10/1/2025, 10:05:14 PM

Last updated: 10/2/2025, 2:05:57 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats