CVE-2025-7763: Open Redirect in thinkgem JeeSite
A vulnerability, which was classified as problematic, was found in thinkgem JeeSite up to 5.12.0. Affected is the function select of the file src/main/java/com/jeesite/modules/cms/web/SiteController.java of the component Site Controller. The manipulation of the argument redirect leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.
AI Analysis
Technical Summary
CVE-2025-7763 is an open redirect vulnerability identified in thinkgem JeeSite, a Java-based web application framework widely used for rapid development of enterprise portals and content management systems. The vulnerability affects versions up to 5.12.0, specifically in the 'select' function of the SiteController component (src/main/java/com/jeesite/modules/cms/web/SiteController.java). The issue arises from improper validation or sanitization of the 'redirect' argument, allowing an attacker to manipulate this parameter to redirect users to arbitrary external URLs. This type of vulnerability is classified as an open redirect, which can be exploited remotely without authentication or privileges. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), indicating a moderate risk. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user authentication (AT:N), but does require user interaction (UI:P), such as clicking a crafted link. The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability does not compromise the server directly but can be leveraged for phishing, social engineering, or bypassing security controls like URL filters or same-origin policies. A patch has been released (commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3) to address this issue by properly validating or restricting the redirect parameter. No known exploits are currently reported in the wild, but public disclosure means attackers could develop exploits soon.
Potential Impact
For European organizations using thinkgem JeeSite, this vulnerability poses a moderate risk primarily related to user trust and phishing attacks. Attackers could craft malicious URLs that appear to originate from legitimate JeeSite-hosted domains, redirecting users to fraudulent websites to steal credentials, deliver malware, or conduct other social engineering attacks. This can lead to reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised as a result. Although the vulnerability does not directly compromise system integrity or availability, the indirect effects of successful phishing campaigns can be significant. Organizations in sectors with high reliance on web portals, such as government, education, and enterprise services, may be particularly impacted. The ease of exploitation and lack of required privileges increase the likelihood of exploitation attempts.
Mitigation Recommendations
European organizations should prioritize applying the official patch (commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3) provided by thinkgem as soon as possible to eliminate the open redirect vulnerability. In addition, organizations should implement strict input validation and whitelist-based URL redirection policies to ensure that redirect parameters only point to trusted internal URLs. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns. Security awareness training should be enhanced to educate users about the risks of clicking on unexpected links, especially those that appear to redirect through trusted domains. Regular security assessments and penetration testing should include checks for open redirect vulnerabilities. Monitoring web server logs for unusual redirect activities can help detect exploitation attempts early. Finally, organizations should review and update their incident response plans to address potential phishing campaigns leveraging this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7763: Open Redirect in thinkgem JeeSite
Description
A vulnerability, which was classified as problematic, was found in thinkgem JeeSite up to 5.12.0. Affected is the function select of the file src/main/java/com/jeesite/modules/cms/web/SiteController.java of the component Site Controller. The manipulation of the argument redirect leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-7763 is an open redirect vulnerability identified in thinkgem JeeSite, a Java-based web application framework widely used for rapid development of enterprise portals and content management systems. The vulnerability affects versions up to 5.12.0, specifically in the 'select' function of the SiteController component (src/main/java/com/jeesite/modules/cms/web/SiteController.java). The issue arises from improper validation or sanitization of the 'redirect' argument, allowing an attacker to manipulate this parameter to redirect users to arbitrary external URLs. This type of vulnerability is classified as an open redirect, which can be exploited remotely without authentication or privileges. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), indicating a moderate risk. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user authentication (AT:N), but does require user interaction (UI:P), such as clicking a crafted link. The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability does not compromise the server directly but can be leveraged for phishing, social engineering, or bypassing security controls like URL filters or same-origin policies. A patch has been released (commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3) to address this issue by properly validating or restricting the redirect parameter. No known exploits are currently reported in the wild, but public disclosure means attackers could develop exploits soon.
Potential Impact
For European organizations using thinkgem JeeSite, this vulnerability poses a moderate risk primarily related to user trust and phishing attacks. Attackers could craft malicious URLs that appear to originate from legitimate JeeSite-hosted domains, redirecting users to fraudulent websites to steal credentials, deliver malware, or conduct other social engineering attacks. This can lead to reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised as a result. Although the vulnerability does not directly compromise system integrity or availability, the indirect effects of successful phishing campaigns can be significant. Organizations in sectors with high reliance on web portals, such as government, education, and enterprise services, may be particularly impacted. The ease of exploitation and lack of required privileges increase the likelihood of exploitation attempts.
Mitigation Recommendations
European organizations should prioritize applying the official patch (commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3) provided by thinkgem as soon as possible to eliminate the open redirect vulnerability. In addition, organizations should implement strict input validation and whitelist-based URL redirection policies to ensure that redirect parameters only point to trusted internal URLs. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns. Security awareness training should be enhanced to educate users about the risks of clicking on unexpected links, especially those that appear to redirect through trusted domains. Regular security assessments and penetration testing should include checks for open redirect vulnerabilities. Monitoring web server logs for unusual redirect activities can help detect exploitation attempts early. Finally, organizations should review and update their incident response plans to address potential phishing campaigns leveraging this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-17T14:35:30.328Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687979bfa83201eaacea8e7f
Added to database: 7/17/2025, 10:31:27 PM
Last enriched: 7/25/2025, 1:02:49 AM
Last updated: 8/25/2025, 12:38:21 PM
Views: 39
Related Threats
CVE-2025-9780: Buffer Overflow in TOTOLINK A702R
HighCVE-2025-2412: CWE-307 Improper Restriction of Excessive Authentication Attempts in Akinsoft QR Menu
HighCVE-2025-0610: CWE-352 Cross-Site Request Forgery (CSRF) in Akınsoft QR Menü
HighCVE-2025-9779: Buffer Overflow in TOTOLINK A702R
HighCVE-2025-9778: Hard-coded Credentials in Tenda W12
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.