Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69725: n/a

0
Medium
VulnerabilityCVE-2025-69725cvecve-2025-69725
Published: Thu Feb 19 2026 (02/19/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An Open Redirect vulnerability in the go-chi/chi >=5.2.2 RedirectSlashes function allows remote attackers to redirect victim users to malicious websites using the legitimate website domain.

AI-Powered Analysis

AILast updated: 02/19/2026, 16:41:13 UTC

Technical Analysis

CVE-2025-69725 is an Open Redirect vulnerability identified in the go-chi/chi web framework, starting from version 5.2.2, specifically within the RedirectSlashes function. The vulnerability allows attackers to manipulate URL redirection logic so that users clicking on a legitimate domain’s link can be redirected to malicious external websites without their knowledge. This occurs because the RedirectSlashes function improperly validates or sanitizes redirect destinations, enabling an attacker to embed a crafted URL that exploits this flaw. The vulnerability does not require authentication and can be triggered remotely, but it does require user interaction, such as clicking a malicious link. The CVSS 3.1 score of 4.7 reflects a medium severity level, with the primary impact being confidentiality loss due to potential phishing or credential theft via social engineering. Integrity and availability are not directly affected. No known public exploits or patches are currently available, indicating the vulnerability is newly disclosed or not yet widely exploited. Organizations using go-chi/chi in their web applications should be aware of this risk, as attackers could leverage it to deceive users and gain indirect access to sensitive information or credentials through phishing campaigns. The vulnerability’s scope is limited to applications using the affected function, but given the popularity of go-chi/chi in Go-based web services, the potential attack surface is notable.

Potential Impact

The primary impact of CVE-2025-69725 is the facilitation of phishing and social engineering attacks by enabling attackers to redirect users from a trusted domain to malicious sites. This can lead to credential theft, malware delivery, or other forms of user compromise. Organizations relying on go-chi/chi for web routing and redirection may see increased risk of user-targeted attacks that exploit trust in their domain names. While the vulnerability does not directly compromise system integrity or availability, the indirect effects on user confidentiality and trust can be significant, potentially damaging brand reputation and leading to financial losses. The requirement for user interaction limits automated exploitation but does not diminish the risk in environments where users frequently click links, such as email campaigns or social media. Since no patches are currently linked, organizations remain exposed until mitigations or updates are applied. The vulnerability’s scope is constrained to web applications using the affected function, but given go-chi/chi’s adoption in cloud-native and microservices architectures, the potential global impact is non-trivial.

Mitigation Recommendations

1. Monitor official go-chi/chi repositories and security advisories for patches addressing CVE-2025-69725 and apply updates promptly once available. 2. Implement strict input validation and sanitization on all user-supplied URLs and parameters involved in redirection logic to prevent open redirect exploitation. 3. Employ allowlists for redirect destinations, ensuring that redirects only point to trusted internal URLs or domains. 4. Use security headers such as Content Security Policy (CSP) to restrict navigation and framing behaviors that could be abused in phishing attacks. 5. Educate users about the risks of clicking unexpected or suspicious links, especially those that appear to come from trusted domains but lead elsewhere. 6. Consider implementing multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing. 7. Conduct regular security testing, including penetration testing and code reviews focused on URL handling and redirection mechanisms. 8. Use web application firewalls (WAFs) to detect and block suspicious redirect patterns or payloads targeting this vulnerability. These steps go beyond generic advice by focusing on proactive validation, user education, and layered defenses tailored to the nature of open redirect vulnerabilities in web frameworks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69973b6be884a8a4cb409738

Added to database: 2/19/2026, 4:33:47 PM

Last enriched: 2/19/2026, 4:41:13 PM

Last updated: 2/19/2026, 6:07:28 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats