Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64754: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in jitsi jitsi-meet

0
Low
VulnerabilityCVE-2025-64754cvecve-2025-64754cwe-601
Published: Thu Nov 13 2025 (11/13/2025, 21:48:08 UTC)
Source: CVE Database V5
Vendor/Project: jitsi
Product: jitsi-meet

Description

Jitsi Meet is an open source video conferencing application. A vulnerability present in versions prior to 2.0.10532 allows attackers to hijack the OAuth authentication window for Microsoft accounts. This is fixed in version 2.0.10532. No known workarounds are available.

AI-Powered Analysis

AILast updated: 11/13/2025, 22:05:07 UTC

Technical Analysis

CVE-2025-64754 is a security vulnerability classified as CWE-601 (Open Redirect) found in the open-source video conferencing application jitsi-meet, specifically in versions prior to 2.0.10532. The flaw allows an attacker to manipulate the OAuth authentication window used for Microsoft accounts by redirecting the user to an untrusted external URL. This hijacking occurs because the application does not properly validate or restrict the redirect URIs during the OAuth flow, enabling an attacker to craft a malicious URL that appears legitimate but leads users to phishing or malicious sites. Exploiting this vulnerability does not require any privileges, user interaction, or authentication, and the attack vector is network-based. The CVSS 4.0 base score is 2.7, reflecting low severity due to limited impact on confidentiality and integrity, and no effect on availability. The vulnerability was publicly disclosed on November 13, 2025, and fixed in version 2.0.10532 of jitsi-meet. No known exploits have been reported in the wild, and no workarounds exist other than upgrading. The vulnerability primarily threatens the confidentiality of user credentials by potentially exposing OAuth tokens or enabling phishing attacks during the authentication process. Since jitsi-meet is widely used for video conferencing, especially in remote work and collaboration scenarios, this vulnerability could be leveraged to compromise user accounts if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-64754 is primarily related to the confidentiality of user credentials and session tokens during Microsoft OAuth authentication in jitsi-meet. Successful exploitation could lead to credential theft or session hijacking, enabling attackers to impersonate users or gain unauthorized access to corporate resources tied to Microsoft accounts. This risk is heightened in organizations heavily reliant on Microsoft 365 services integrated with jitsi-meet for collaboration. However, the vulnerability does not affect system integrity or availability, limiting the scope of damage. The low CVSS score and absence of known exploits suggest a low immediate threat, but the potential for phishing and account compromise remains a concern. European entities with strict data protection regulations (e.g., GDPR) must consider the confidentiality risk seriously, as credential compromise could lead to data breaches and regulatory penalties. The threat is more significant in sectors with high usage of jitsi-meet and Microsoft OAuth, such as education, government, and enterprises adopting remote work technologies.

Mitigation Recommendations

The primary mitigation for CVE-2025-64754 is to upgrade all jitsi-meet deployments to version 2.0.10532 or later, where the open redirect vulnerability has been fixed. Organizations should audit their current jitsi-meet versions and prioritize patching vulnerable instances. Additionally, administrators should review and enforce strict validation of OAuth redirect URIs to ensure only trusted domains are allowed, minimizing the risk of redirection to malicious sites. Implementing multi-factor authentication (MFA) on Microsoft accounts can reduce the impact of credential theft. Monitoring OAuth authentication logs for unusual redirect patterns or failed login attempts can help detect exploitation attempts. User awareness training about phishing risks related to OAuth redirection should be conducted. Network-level protections such as web filtering and URL reputation services can block access to known malicious redirect destinations. Finally, organizations should maintain an incident response plan to quickly address any suspected compromise stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T22:29:34.874Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6916529405b975ba75927702

Added to database: 11/13/2025, 9:50:12 PM

Last enriched: 11/13/2025, 10:05:07 PM

Last updated: 11/14/2025, 5:40:02 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats