Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64116: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in leepeuker movary

0
Medium
VulnerabilityCVE-2025-64116cvecve-2025-64116cwe-601
Published: Thu Oct 30 2025 (10/30/2025, 17:32:41 UTC)
Source: CVE Database V5
Vendor/Project: leepeuker
Product: movary

Description

CVE-2025-64116 is an open redirect vulnerability in the Movary web application prior to version 0. 69. 0. The login page accepts a redirect parameter without proper validation, allowing attackers to redirect authenticated users to arbitrary external websites. This flaw can be exploited to facilitate phishing attacks or redirect users to malicious sites. The vulnerability has a CVSS 4. 0 base score of 5. 1, indicating medium severity. It does not require authentication or privileges but does require user interaction (clicking a crafted link). The issue is fixed in Movary version 0.

AI-Powered Analysis

AILast updated: 10/30/2025, 18:11:15 UTC

Technical Analysis

CVE-2025-64116 identifies an open redirect vulnerability (CWE-601) in the Movary web application, a platform used for tracking and rating movie watch history. Versions prior to 0.69.0 contain a flaw in the login page where the redirect parameter is accepted without validation. This allows attackers to craft URLs that redirect authenticated users to arbitrary external sites after login. Such open redirects can be exploited in phishing campaigns to trick users into visiting malicious websites that may harvest credentials or deliver malware. The vulnerability does not require any privileges or authentication to exploit but does require user interaction, such as clicking a malicious link. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no privileges or authentication required, user interaction needed, and limited scope and impact confined to user trust and potential redirection. No known exploits are currently in the wild, and the issue was publicly disclosed on October 30, 2025. The vulnerability is resolved in Movary version 0.69.0 by implementing proper validation of the redirect parameter to prevent redirection to untrusted external sites.

Potential Impact

For European organizations using Movary versions prior to 0.69.0, this vulnerability primarily threatens user trust and security by enabling phishing and social engineering attacks. Attackers can redirect users to malicious websites that may attempt credential theft, malware installation, or other fraudulent activities. While the vulnerability does not directly compromise the confidentiality, integrity, or availability of the Movary application or backend systems, successful exploitation could lead to indirect impacts such as account compromise or reputational damage. Organizations with a user base that relies on Movary for media tracking may face increased risk of targeted phishing campaigns leveraging this open redirect flaw. The impact is more pronounced in sectors with high user interaction and where Movary is integrated into broader user authentication workflows or single sign-on environments.

Mitigation Recommendations

European organizations should immediately upgrade Movary to version 0.69.0 or later, where the vulnerability is fixed. Until upgrading, administrators should consider disabling or restricting access to the login page redirect functionality if feasible. Implementing web application firewall (WAF) rules to detect and block suspicious redirect parameters can provide temporary protection. User education campaigns should warn about phishing attempts involving unexpected redirects from Movary URLs. Additionally, organizations should monitor logs for unusual redirect parameter usage and suspicious login redirection patterns. Integrating multi-factor authentication (MFA) can reduce the risk of account compromise even if users are redirected to malicious sites. Finally, security teams should review and update incident response plans to address potential phishing campaigns exploiting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-27T15:26:14.128Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6903a6a4aebfcd54748ac674

Added to database: 10/30/2025, 5:55:48 PM

Last enriched: 10/30/2025, 6:11:15 PM

Last updated: 10/30/2025, 7:13:39 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats