Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62428: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in Drawing-Captcha Drawing-Captcha-APP

0
High
VulnerabilityCVE-2025-62428cvecve-2025-62428cwe-601
Published: Thu Oct 16 2025 (10/16/2025, 18:57:14 UTC)
Source: CVE Database V5
Vendor/Project: Drawing-Captcha
Product: Drawing-Captcha-APP

Description

Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.

AI-Powered Analysis

AILast updated: 10/24/2025, 00:48:50 UTC

Technical Analysis

CVE-2025-62428 is an open redirect vulnerability classified under CWE-601 found in Drawing-Captcha-APP, a tool providing interactive verification for web applications. The flaw is due to Host Header Injection in the /register and /confirm-email endpoints, where the application improperly trusts the Host header from HTTP requests when generating email confirmation links. Attackers can exploit this by sending crafted requests with manipulated Host headers, causing the application to generate confirmation URLs that redirect users to malicious domains controlled by the attacker. This can facilitate phishing attacks, credential harvesting, or redirect users to malware-hosting sites. The vulnerability affects all versions prior to 1.2.5-alpha-patch and does not require authentication or user interaction, making it trivially exploitable remotely. The CVSS 4.0 score of 8.8 reflects high impact on confidentiality and integrity due to potential user credential compromise and trust exploitation. No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a critical risk for any organization relying on Drawing-Captcha-APP for user verification. The fix involves proper validation or sanitization of the Host header and updating to the patched version.

Potential Impact

For European organizations, this vulnerability poses a significant risk to user account security and trust in web-based services. Attackers can exploit the open redirect to craft convincing phishing emails with malicious confirmation links, potentially leading to credential theft, unauthorized account access, or further malware infection. This can result in data breaches, reputational damage, and regulatory non-compliance under GDPR if personal data is compromised. Organizations relying on Drawing-Captcha-APP for user registration or email verification workflows are directly impacted. The vulnerability could also be leveraged in broader social engineering campaigns targeting European users. The lack of required authentication or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. The impact extends to service availability indirectly if compromised accounts are used for fraudulent activities or spam distribution.

Mitigation Recommendations

1. Immediately upgrade Drawing-Captcha-APP to version 1.2.5-alpha-patch or later, which contains the fix for this vulnerability. 2. Implement strict validation and sanitization of the Host header on the server side to ensure it matches expected domain values before generating URLs. 3. Use absolute URLs with hardcoded trusted domains in email confirmation links rather than relying on dynamic Host headers. 4. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 5. Monitor email confirmation workflows for unusual redirect patterns or user reports of suspicious links. 6. Educate users to verify URLs in confirmation emails and report suspicious redirects. 7. Conduct regular security audits and penetration testing focusing on header injection and open redirect vulnerabilities. 8. Implement Content Security Policy (CSP) and email security standards like DMARC, DKIM, and SPF to reduce phishing success.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-13T16:26:12.180Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f140779f8a5dbaeaf6e5c0

Added to database: 10/16/2025, 6:59:03 PM

Last enriched: 10/24/2025, 12:48:50 AM

Last updated: 12/4/2025, 1:34:00 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats