Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64754: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in jitsi jitsi-meet

0
Low
VulnerabilityCVE-2025-64754cvecve-2025-64754cwe-601
Published: Thu Nov 13 2025 (11/13/2025, 21:48:08 UTC)
Source: CVE Database V5
Vendor/Project: jitsi
Product: jitsi-meet

Description

Jitsi Meet is an open source video conferencing application. A vulnerability present in versions prior to 2.0.10532 allows attackers to hijack the OAuth authentication window for Microsoft accounts. This is fixed in version 2.0.10532. No known workarounds are available.

AI-Powered Analysis

AILast updated: 11/20/2025, 23:14:42 UTC

Technical Analysis

CVE-2025-64754 is classified as a CWE-601 open redirect vulnerability affecting jitsi-meet, an open-source video conferencing platform. The flaw exists in versions prior to 2.0.10532 and allows attackers to manipulate the OAuth authentication window used for Microsoft accounts. Specifically, during the OAuth login process, the application improperly validates redirect URLs, enabling an attacker to redirect users to malicious, untrusted sites. This can lead to phishing attacks or interception of authentication tokens if users are tricked into providing credentials or authorizing malicious applications. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. However, the impact on confidentiality, integrity, and availability is limited, as the vulnerability does not directly expose sensitive data or allow code execution. The CVSS 4.0 score of 2.7 reflects this low severity, with network attack vector, low complexity, and no privileges or user interaction required. No known exploits have been reported in the wild, and no workarounds are available, so upgrading to version 2.0.10532 is the only effective remediation. The vulnerability highlights the importance of proper validation of redirect URLs in OAuth implementations to prevent open redirect attacks.

Potential Impact

For European organizations, the primary risk is phishing and credential theft via malicious redirection during Microsoft OAuth authentication in jitsi-meet. Organizations relying on jitsi-meet for video conferencing and using Microsoft accounts for authentication are at risk of users being redirected to attacker-controlled sites, potentially compromising account credentials or session tokens. This could lead to unauthorized access to corporate resources if attackers leverage stolen tokens or credentials. However, the vulnerability does not allow direct system compromise or data exfiltration through jitsi-meet itself. The low CVSS score indicates limited impact on system availability or integrity. Still, organizations in sectors with high security requirements, such as finance, healthcare, or government, should prioritize patching to prevent phishing-based breaches. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks. The impact is more pronounced in environments where users are less security-aware or where multi-factor authentication is not enforced.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of jitsi-meet to version 2.0.10532 or later, where the vulnerability is fixed. Organizations should audit their deployments to identify any running vulnerable versions. Additionally, implement strict URL validation and whitelisting for OAuth redirect URIs to prevent open redirects. Educate users about phishing risks associated with unexpected redirects during authentication flows. Enforce multi-factor authentication (MFA) on Microsoft accounts to reduce the risk of credential compromise. Monitor authentication logs for unusual redirect patterns or failed login attempts that may indicate exploitation attempts. Network-level protections such as web filtering and DNS filtering can help block access to known malicious domains used in phishing campaigns. Finally, maintain an incident response plan to quickly address any suspected compromise resulting from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-10T22:29:34.874Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6916529405b975ba75927702

Added to database: 11/13/2025, 9:50:12 PM

Last enriched: 11/20/2025, 11:14:42 PM

Last updated: 12/28/2025, 11:59:36 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats