CVE-2025-64116: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in leepeuker movary
CVE-2025-64116 is an open redirect vulnerability in the Movary web application prior to version 0. 69. 0. The login page accepts a redirect parameter without proper validation, allowing attackers to redirect authenticated users to arbitrary external websites. This flaw can be exploited to facilitate phishing attacks or redirect users to malicious sites. The vulnerability has a CVSS 4. 0 base score of 5. 1, indicating medium severity. It does not require authentication or privileges but does require user interaction (clicking a crafted link). The issue is fixed in Movary version 0.
AI Analysis
Technical Summary
CVE-2025-64116 identifies an open redirect vulnerability (CWE-601) in the Movary web application, a platform used for tracking and rating movie watch history. Versions prior to 0.69.0 contain a flaw in the login page where the redirect parameter is accepted without validation. This allows attackers to craft URLs that redirect authenticated users to arbitrary external sites after login. Such open redirects can be exploited in phishing campaigns to trick users into visiting malicious websites that may harvest credentials or deliver malware. The vulnerability does not require any privileges or authentication to exploit but does require user interaction, such as clicking a malicious link. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no privileges or authentication required, user interaction needed, and limited scope and impact confined to user trust and potential redirection. No known exploits are currently in the wild, and the issue was publicly disclosed on October 30, 2025. The vulnerability is resolved in Movary version 0.69.0 by implementing proper validation of the redirect parameter to prevent redirection to untrusted external sites.
Potential Impact
For European organizations using Movary versions prior to 0.69.0, this vulnerability primarily threatens user trust and security by enabling phishing and social engineering attacks. Attackers can redirect users to malicious websites that may attempt credential theft, malware installation, or other fraudulent activities. While the vulnerability does not directly compromise the confidentiality, integrity, or availability of the Movary application or backend systems, successful exploitation could lead to indirect impacts such as account compromise or reputational damage. Organizations with a user base that relies on Movary for media tracking may face increased risk of targeted phishing campaigns leveraging this open redirect flaw. The impact is more pronounced in sectors with high user interaction and where Movary is integrated into broader user authentication workflows or single sign-on environments.
Mitigation Recommendations
European organizations should immediately upgrade Movary to version 0.69.0 or later, where the vulnerability is fixed. Until upgrading, administrators should consider disabling or restricting access to the login page redirect functionality if feasible. Implementing web application firewall (WAF) rules to detect and block suspicious redirect parameters can provide temporary protection. User education campaigns should warn about phishing attempts involving unexpected redirects from Movary URLs. Additionally, organizations should monitor logs for unusual redirect parameter usage and suspicious login redirection patterns. Integrating multi-factor authentication (MFA) can reduce the risk of account compromise even if users are redirected to malicious sites. Finally, security teams should review and update incident response plans to address potential phishing campaigns exploiting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Denmark
CVE-2025-64116: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in leepeuker movary
Description
CVE-2025-64116 is an open redirect vulnerability in the Movary web application prior to version 0. 69. 0. The login page accepts a redirect parameter without proper validation, allowing attackers to redirect authenticated users to arbitrary external websites. This flaw can be exploited to facilitate phishing attacks or redirect users to malicious sites. The vulnerability has a CVSS 4. 0 base score of 5. 1, indicating medium severity. It does not require authentication or privileges but does require user interaction (clicking a crafted link). The issue is fixed in Movary version 0.
AI-Powered Analysis
Technical Analysis
CVE-2025-64116 identifies an open redirect vulnerability (CWE-601) in the Movary web application, a platform used for tracking and rating movie watch history. Versions prior to 0.69.0 contain a flaw in the login page where the redirect parameter is accepted without validation. This allows attackers to craft URLs that redirect authenticated users to arbitrary external sites after login. Such open redirects can be exploited in phishing campaigns to trick users into visiting malicious websites that may harvest credentials or deliver malware. The vulnerability does not require any privileges or authentication to exploit but does require user interaction, such as clicking a malicious link. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no privileges or authentication required, user interaction needed, and limited scope and impact confined to user trust and potential redirection. No known exploits are currently in the wild, and the issue was publicly disclosed on October 30, 2025. The vulnerability is resolved in Movary version 0.69.0 by implementing proper validation of the redirect parameter to prevent redirection to untrusted external sites.
Potential Impact
For European organizations using Movary versions prior to 0.69.0, this vulnerability primarily threatens user trust and security by enabling phishing and social engineering attacks. Attackers can redirect users to malicious websites that may attempt credential theft, malware installation, or other fraudulent activities. While the vulnerability does not directly compromise the confidentiality, integrity, or availability of the Movary application or backend systems, successful exploitation could lead to indirect impacts such as account compromise or reputational damage. Organizations with a user base that relies on Movary for media tracking may face increased risk of targeted phishing campaigns leveraging this open redirect flaw. The impact is more pronounced in sectors with high user interaction and where Movary is integrated into broader user authentication workflows or single sign-on environments.
Mitigation Recommendations
European organizations should immediately upgrade Movary to version 0.69.0 or later, where the vulnerability is fixed. Until upgrading, administrators should consider disabling or restricting access to the login page redirect functionality if feasible. Implementing web application firewall (WAF) rules to detect and block suspicious redirect parameters can provide temporary protection. User education campaigns should warn about phishing attempts involving unexpected redirects from Movary URLs. Additionally, organizations should monitor logs for unusual redirect parameter usage and suspicious login redirection patterns. Integrating multi-factor authentication (MFA) can reduce the risk of account compromise even if users are redirected to malicious sites. Finally, security teams should review and update incident response plans to address potential phishing campaigns exploiting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-27T15:26:14.128Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6903a6a4aebfcd54748ac674
Added to database: 10/30/2025, 5:55:48 PM
Last enriched: 10/30/2025, 6:11:15 PM
Last updated: 10/30/2025, 7:13:39 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63422: n/a
UnknownCVE-2025-36137: CWE-250 Execution with Unnecessary Privileges in IBM Sterling Connect:Direct for Unix
HighCVE-2025-63885: n/a
MediumCVE-2025-61196: n/a
HighCVE-2025-63298: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.