CVE-2025-64754: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in jitsi jitsi-meet
Jitsi Meet is an open source video conferencing application. A vulnerability present in versions prior to 2.0.10532 allows attackers to hijack the OAuth authentication window for Microsoft accounts. This is fixed in version 2.0.10532. No known workarounds are available.
AI Analysis
Technical Summary
CVE-2025-64754 is classified as a CWE-601 open redirect vulnerability affecting jitsi-meet, an open-source video conferencing platform. The flaw exists in versions prior to 2.0.10532 and allows attackers to manipulate the OAuth authentication window used for Microsoft accounts. Specifically, during the OAuth login process, the application improperly validates redirect URLs, enabling an attacker to redirect users to malicious, untrusted sites. This can lead to phishing attacks or interception of authentication tokens if users are tricked into providing credentials or authorizing malicious applications. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. However, the impact on confidentiality, integrity, and availability is limited, as the vulnerability does not directly expose sensitive data or allow code execution. The CVSS 4.0 score of 2.7 reflects this low severity, with network attack vector, low complexity, and no privileges or user interaction required. No known exploits have been reported in the wild, and no workarounds are available, so upgrading to version 2.0.10532 is the only effective remediation. The vulnerability highlights the importance of proper validation of redirect URLs in OAuth implementations to prevent open redirect attacks.
Potential Impact
For European organizations, the primary risk is phishing and credential theft via malicious redirection during Microsoft OAuth authentication in jitsi-meet. Organizations relying on jitsi-meet for video conferencing and using Microsoft accounts for authentication are at risk of users being redirected to attacker-controlled sites, potentially compromising account credentials or session tokens. This could lead to unauthorized access to corporate resources if attackers leverage stolen tokens or credentials. However, the vulnerability does not allow direct system compromise or data exfiltration through jitsi-meet itself. The low CVSS score indicates limited impact on system availability or integrity. Still, organizations in sectors with high security requirements, such as finance, healthcare, or government, should prioritize patching to prevent phishing-based breaches. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks. The impact is more pronounced in environments where users are less security-aware or where multi-factor authentication is not enforced.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of jitsi-meet to version 2.0.10532 or later, where the vulnerability is fixed. Organizations should audit their deployments to identify any running vulnerable versions. Additionally, implement strict URL validation and whitelisting for OAuth redirect URIs to prevent open redirects. Educate users about phishing risks associated with unexpected redirects during authentication flows. Enforce multi-factor authentication (MFA) on Microsoft accounts to reduce the risk of credential compromise. Monitor authentication logs for unusual redirect patterns or failed login attempts that may indicate exploitation attempts. Network-level protections such as web filtering and DNS filtering can help block access to known malicious domains used in phishing campaigns. Finally, maintain an incident response plan to quickly address any suspected compromise resulting from this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-64754: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in jitsi jitsi-meet
Description
Jitsi Meet is an open source video conferencing application. A vulnerability present in versions prior to 2.0.10532 allows attackers to hijack the OAuth authentication window for Microsoft accounts. This is fixed in version 2.0.10532. No known workarounds are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-64754 is classified as a CWE-601 open redirect vulnerability affecting jitsi-meet, an open-source video conferencing platform. The flaw exists in versions prior to 2.0.10532 and allows attackers to manipulate the OAuth authentication window used for Microsoft accounts. Specifically, during the OAuth login process, the application improperly validates redirect URLs, enabling an attacker to redirect users to malicious, untrusted sites. This can lead to phishing attacks or interception of authentication tokens if users are tricked into providing credentials or authorizing malicious applications. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. However, the impact on confidentiality, integrity, and availability is limited, as the vulnerability does not directly expose sensitive data or allow code execution. The CVSS 4.0 score of 2.7 reflects this low severity, with network attack vector, low complexity, and no privileges or user interaction required. No known exploits have been reported in the wild, and no workarounds are available, so upgrading to version 2.0.10532 is the only effective remediation. The vulnerability highlights the importance of proper validation of redirect URLs in OAuth implementations to prevent open redirect attacks.
Potential Impact
For European organizations, the primary risk is phishing and credential theft via malicious redirection during Microsoft OAuth authentication in jitsi-meet. Organizations relying on jitsi-meet for video conferencing and using Microsoft accounts for authentication are at risk of users being redirected to attacker-controlled sites, potentially compromising account credentials or session tokens. This could lead to unauthorized access to corporate resources if attackers leverage stolen tokens or credentials. However, the vulnerability does not allow direct system compromise or data exfiltration through jitsi-meet itself. The low CVSS score indicates limited impact on system availability or integrity. Still, organizations in sectors with high security requirements, such as finance, healthcare, or government, should prioritize patching to prevent phishing-based breaches. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks. The impact is more pronounced in environments where users are less security-aware or where multi-factor authentication is not enforced.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of jitsi-meet to version 2.0.10532 or later, where the vulnerability is fixed. Organizations should audit their deployments to identify any running vulnerable versions. Additionally, implement strict URL validation and whitelisting for OAuth redirect URIs to prevent open redirects. Educate users about phishing risks associated with unexpected redirects during authentication flows. Enforce multi-factor authentication (MFA) on Microsoft accounts to reduce the risk of credential compromise. Monitor authentication logs for unusual redirect patterns or failed login attempts that may indicate exploitation attempts. Network-level protections such as web filtering and DNS filtering can help block access to known malicious domains used in phishing campaigns. Finally, maintain an incident response plan to quickly address any suspected compromise resulting from this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-10T22:29:34.874Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6916529405b975ba75927702
Added to database: 11/13/2025, 9:50:12 PM
Last enriched: 11/20/2025, 11:14:42 PM
Last updated: 12/28/2025, 11:59:36 PM
Views: 112
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15162: Stack-based Buffer Overflow in Tenda WH450
HighCVE-2025-15161: Stack-based Buffer Overflow in Tenda WH450
HighCVE-2025-15160: Stack-based Buffer Overflow in Tenda WH450
HighCVE-2025-15155: Stack-based Buffer Overflow in floooh sokol
MediumCVE-2025-15154: Use of Less Trusted Source in PbootCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.