Skip to main content

CVE-2025-7763: Open Redirect in thinkgem JeeSite

Medium
VulnerabilityCVE-2025-7763cvecve-2025-7763
Published: Thu Jul 17 2025 (07/17/2025, 22:14:07 UTC)
Source: CVE Database V5
Vendor/Project: thinkgem
Product: JeeSite

Description

A vulnerability, which was classified as problematic, was found in thinkgem JeeSite up to 5.12.0. Affected is the function select of the file src/main/java/com/jeesite/modules/cms/web/SiteController.java of the component Site Controller. The manipulation of the argument redirect leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 07/25/2025, 01:02:49 UTC

Technical Analysis

CVE-2025-7763 is an open redirect vulnerability identified in thinkgem JeeSite, a Java-based web application framework widely used for rapid development of enterprise portals and content management systems. The vulnerability affects versions up to 5.12.0, specifically in the 'select' function of the SiteController component (src/main/java/com/jeesite/modules/cms/web/SiteController.java). The issue arises from improper validation or sanitization of the 'redirect' argument, allowing an attacker to manipulate this parameter to redirect users to arbitrary external URLs. This type of vulnerability is classified as an open redirect, which can be exploited remotely without authentication or privileges. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), indicating a moderate risk. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user authentication (AT:N), but does require user interaction (UI:P), such as clicking a crafted link. The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability does not compromise the server directly but can be leveraged for phishing, social engineering, or bypassing security controls like URL filters or same-origin policies. A patch has been released (commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3) to address this issue by properly validating or restricting the redirect parameter. No known exploits are currently reported in the wild, but public disclosure means attackers could develop exploits soon.

Potential Impact

For European organizations using thinkgem JeeSite, this vulnerability poses a moderate risk primarily related to user trust and phishing attacks. Attackers could craft malicious URLs that appear to originate from legitimate JeeSite-hosted domains, redirecting users to fraudulent websites to steal credentials, deliver malware, or conduct other social engineering attacks. This can lead to reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised as a result. Although the vulnerability does not directly compromise system integrity or availability, the indirect effects of successful phishing campaigns can be significant. Organizations in sectors with high reliance on web portals, such as government, education, and enterprise services, may be particularly impacted. The ease of exploitation and lack of required privileges increase the likelihood of exploitation attempts.

Mitigation Recommendations

European organizations should prioritize applying the official patch (commit 3d06b8d009d0267f0255acc87ea19d29d07cedc3) provided by thinkgem as soon as possible to eliminate the open redirect vulnerability. In addition, organizations should implement strict input validation and whitelist-based URL redirection policies to ensure that redirect parameters only point to trusted internal URLs. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns. Security awareness training should be enhanced to educate users about the risks of clicking on unexpected links, especially those that appear to redirect through trusted domains. Regular security assessments and penetration testing should include checks for open redirect vulnerabilities. Monitoring web server logs for unusual redirect activities can help detect exploitation attempts early. Finally, organizations should review and update their incident response plans to address potential phishing campaigns leveraging this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-17T14:35:30.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687979bfa83201eaacea8e7f

Added to database: 7/17/2025, 10:31:27 PM

Last enriched: 7/25/2025, 1:02:49 AM

Last updated: 8/25/2025, 12:38:21 PM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats