Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62428: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Drawing-Captcha Drawing-Captcha-APP

0
High
VulnerabilityCVE-2025-62428cvecve-2025-62428cwe-601
Published: Thu Oct 16 2025 (10/16/2025, 18:57:14 UTC)
Source: CVE Database V5
Vendor/Project: Drawing-Captcha
Product: Drawing-Captcha-APP

Description

Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.

AI-Powered Analysis

AILast updated: 10/16/2025, 19:14:25 UTC

Technical Analysis

CVE-2025-62428 is an open redirect vulnerability classified under CWE-601, found in the Drawing-Captcha-APP, a tool that provides interactive verification for web applications. The root cause is a Host Header Injection vulnerability in the /register and /confirm-email endpoints, where the application trusts the Host header from incoming HTTP requests without proper validation. Attackers can exploit this by sending crafted requests with manipulated Host headers, causing the application to generate email confirmation links that redirect users to attacker-controlled domains. This can facilitate phishing attacks by tricking users into clicking malicious links that appear legitimate, potentially leading to credential theft, session hijacking, or further exploitation. The vulnerability affects all versions prior to 1.2.5-alpha-patch and does not require authentication or user interaction to exploit, increasing its risk profile. The CVSS 4.0 base score of 8.8 reflects the vulnerability's ease of exploitation (network vector, low attack complexity), no privileges or user interaction required, and high impact on confidentiality and integrity due to potential redirection to malicious sites. Although no exploits are currently known in the wild, the vulnerability's presence in a widely used verification component makes it a significant threat. The fix involves updating to version 1.2.5-alpha-patch where proper validation of the Host header is implemented to prevent injection and open redirect issues.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily through phishing and social engineering attacks leveraging malicious email confirmation links. Attackers can redirect users to fraudulent websites that mimic legitimate services, increasing the likelihood of credential compromise or malware infection. This can lead to unauthorized access to sensitive systems, data breaches, and reputational damage. Organizations relying on Drawing-Captcha-APP for user verification are particularly vulnerable, as the attack vector targets the account registration and email confirmation process—a critical security control. The lack of required authentication or user interaction for exploitation broadens the attack surface, potentially affecting a large user base. Additionally, sectors with high regulatory scrutiny in Europe, such as finance, healthcare, and government, may face compliance risks if user data is compromised due to this vulnerability. The potential for widespread phishing campaigns exploiting this flaw could also impact end users and partners, amplifying the overall damage.

Mitigation Recommendations

European organizations should immediately upgrade Drawing-Captcha-APP to version 1.2.5-alpha-patch, which contains the fix for this vulnerability. Beyond patching, organizations should implement strict validation of Host headers on all endpoints to ensure they match expected domain values, rejecting or sanitizing any suspicious inputs. Email confirmation links should be generated using server-side trusted values rather than relying on client-supplied headers. Employing web application firewalls (WAFs) with rules to detect and block Host header manipulation attempts can provide an additional layer of defense. Security teams should audit email templates and confirmation workflows to verify no other injection points exist. User awareness training focused on recognizing phishing attempts involving email confirmation links can reduce the risk of successful exploitation. Monitoring for anomalous registration or confirmation activities and implementing rate limiting can help detect and mitigate automated exploitation attempts. Finally, organizations should review their incident response plans to address potential phishing or credential compromise incidents stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-13T16:26:12.180Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f140779f8a5dbaeaf6e5c0

Added to database: 10/16/2025, 6:59:03 PM

Last enriched: 10/16/2025, 7:14:25 PM

Last updated: 10/17/2025, 4:12:56 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats