CVE-2025-62428: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Drawing-Captcha Drawing-Captcha-APP
Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.
AI Analysis
Technical Summary
CVE-2025-62428 is an open redirect vulnerability classified under CWE-601 found in Drawing-Captcha-APP, a tool providing interactive verification for web applications. The flaw is due to Host Header Injection in the /register and /confirm-email endpoints, where the application improperly trusts the Host header from HTTP requests when generating email confirmation links. Attackers can exploit this by sending crafted requests with manipulated Host headers, causing the application to generate confirmation URLs that redirect users to malicious domains controlled by the attacker. This can facilitate phishing attacks, credential harvesting, or redirect users to malware-hosting sites. The vulnerability affects all versions prior to 1.2.5-alpha-patch and does not require authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 score of 8.8 reflects high impact on confidentiality and integrity due to potential user credential compromise and trust exploitation. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a critical risk for any organization relying on Drawing-Captcha-APP for user verification. The fix involves proper validation or sanitization of the Host header and updating to the patched version.
Potential Impact
For European organizations, this vulnerability poses a significant risk to user account security and trust in web-based services. Attackers can exploit the open redirect to craft convincing phishing emails with malicious confirmation links, potentially leading to credential theft, unauthorized account access, or further malware infection. This can result in data breaches, reputational damage, and regulatory non-compliance under GDPR if personal data is compromised. Organizations relying on Drawing-Captcha-APP for user registration or email verification workflows are directly impacted. The vulnerability could also be leveraged in broader social engineering campaigns targeting European users. The lack of required authentication or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. The impact extends to service availability indirectly if compromised accounts are used for fraudulent activities or spam distribution.
Mitigation Recommendations
1. Immediately upgrade Drawing-Captcha-APP to version 1.2.5-alpha-patch or later, which contains the fix for this vulnerability. 2. Implement strict validation and sanitization of the Host header on the server side to ensure it matches expected domain values before generating URLs. 3. Use absolute URLs with hardcoded trusted domains in email confirmation links rather than relying on dynamic Host headers. 4. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 5. Monitor email confirmation workflows for unusual redirect patterns or user reports of suspicious links. 6. Educate users to verify URLs in confirmation emails and report suspicious redirects. 7. Conduct regular security audits and penetration testing focusing on header injection and open redirect vulnerabilities. 8. Implement Content Security Policy (CSP) and email security standards like DMARC, DKIM, and SPF to reduce phishing success.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-62428: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Drawing-Captcha Drawing-Captcha-APP
Description
Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.
AI-Powered Analysis
Technical Analysis
CVE-2025-62428 is an open redirect vulnerability classified under CWE-601 found in Drawing-Captcha-APP, a tool providing interactive verification for web applications. The flaw is due to Host Header Injection in the /register and /confirm-email endpoints, where the application improperly trusts the Host header from HTTP requests when generating email confirmation links. Attackers can exploit this by sending crafted requests with manipulated Host headers, causing the application to generate confirmation URLs that redirect users to malicious domains controlled by the attacker. This can facilitate phishing attacks, credential harvesting, or redirect users to malware-hosting sites. The vulnerability affects all versions prior to 1.2.5-alpha-patch and does not require authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 score of 8.8 reflects high impact on confidentiality and integrity due to potential user credential compromise and trust exploitation. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a critical risk for any organization relying on Drawing-Captcha-APP for user verification. The fix involves proper validation or sanitization of the Host header and updating to the patched version.
Potential Impact
For European organizations, this vulnerability poses a significant risk to user account security and trust in web-based services. Attackers can exploit the open redirect to craft convincing phishing emails with malicious confirmation links, potentially leading to credential theft, unauthorized account access, or further malware infection. This can result in data breaches, reputational damage, and regulatory non-compliance under GDPR if personal data is compromised. Organizations relying on Drawing-Captcha-APP for user registration or email verification workflows are directly impacted. The vulnerability could also be leveraged in broader social engineering campaigns targeting European users. The lack of required authentication or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. The impact extends to service availability indirectly if compromised accounts are used for fraudulent activities or spam distribution.
Mitigation Recommendations
1. Immediately upgrade Drawing-Captcha-APP to version 1.2.5-alpha-patch or later, which contains the fix for this vulnerability. 2. Implement strict validation and sanitization of the Host header on the server side to ensure it matches expected domain values before generating URLs. 3. Use absolute URLs with hardcoded trusted domains in email confirmation links rather than relying on dynamic Host headers. 4. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 5. Monitor email confirmation workflows for unusual redirect patterns or user reports of suspicious links. 6. Educate users to verify URLs in confirmation emails and report suspicious redirects. 7. Conduct regular security audits and penetration testing focusing on header injection and open redirect vulnerabilities. 8. Implement Content Security Policy (CSP) and email security standards like DMARC, DKIM, and SPF to reduce phishing success.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-13T16:26:12.180Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f140779f8a5dbaeaf6e5c0
Added to database: 10/16/2025, 6:59:03 PM
Last enriched: 10/24/2025, 12:48:50 AM
Last updated: 12/4/2025, 1:34:00 PM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11222: na in LINE Corporation Central Dogma
MediumCVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.