CVE-2025-7949: Open Redirect in Sanluan PublicCMS
A vulnerability was found in Sanluan PublicCMS up to 5.202506.a. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file publiccms-parent/publiccms/src/main/resources/templates/admin/cmsDiy/preview.html. The manipulation of the argument url leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named c1e79f124e3f4c458315d908ed7dee06f9f12a76/f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.
AI Analysis
Technical Summary
CVE-2025-7949 is an open redirect vulnerability identified in Sanluan PublicCMS versions up to 5.202506.a. The vulnerability resides in the handling of the 'url' argument within the template file located at publiccms-parent/publiccms/src/main/resources/templates/admin/cmsDiy/preview.html. An attacker can manipulate this 'url' parameter to redirect users to arbitrary external websites. This type of vulnerability is classified as an open redirect, which can be exploited remotely without requiring authentication. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The vector details show that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, which actually means low privileges required), and user interaction is required (UI:P). The impact on confidentiality is none (VC:N), integrity is low (VI:L), and availability is none (VA:N). The vulnerability does not affect system confidentiality or availability but can impact integrity by redirecting users to malicious sites, potentially facilitating phishing, malware distribution, or social engineering attacks. A patch has been developed and is referenced by commit hashes c1e79f124e3f4c458315d908ed7dee06f9f12a76 and f1af17af004ca9345c6fe4d5936d87d008d26e75, and it is strongly recommended to apply this patch to remediate the issue. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using Sanluan PublicCMS, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Attackers can craft URLs that appear to originate from trusted internal CMS domains but redirect users to malicious external sites, potentially leading to credential theft, malware infection, or other fraud. This can undermine user trust in the affected organization's web properties and may lead to reputational damage. While the vulnerability does not directly compromise system confidentiality or availability, the indirect consequences of successful phishing or malware campaigns can be significant. Organizations in sectors with high reliance on web content management systems, such as media, education, government, and e-commerce, are particularly at risk. The requirement for user interaction means that user awareness and training are critical components of risk mitigation. Additionally, the vulnerability could be leveraged as part of a multi-stage attack chain, increasing its potential impact.
Mitigation Recommendations
1. Immediate application of the official patch referenced by the commit hashes to Sanluan PublicCMS is the most effective mitigation. 2. Implement strict input validation and output encoding for URL parameters within the CMS to prevent manipulation of redirect targets. 3. Employ Content Security Policy (CSP) headers to restrict the domains to which users can be redirected. 4. Use web application firewalls (WAFs) to detect and block suspicious redirect patterns or anomalous URL parameters. 5. Conduct user awareness training to educate users about the risks of clicking on unexpected links, especially those that appear to redirect externally. 6. Monitor web server logs for unusual redirect activities or spikes in traffic to unknown external domains. 7. Consider implementing multi-factor authentication (MFA) for CMS administrative access to reduce the risk of further compromise if phishing is successful. 8. Regularly audit and review CMS templates and code for similar vulnerabilities to proactively identify and remediate issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7949: Open Redirect in Sanluan PublicCMS
Description
A vulnerability was found in Sanluan PublicCMS up to 5.202506.a. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file publiccms-parent/publiccms/src/main/resources/templates/admin/cmsDiy/preview.html. The manipulation of the argument url leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named c1e79f124e3f4c458315d908ed7dee06f9f12a76/f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-7949 is an open redirect vulnerability identified in Sanluan PublicCMS versions up to 5.202506.a. The vulnerability resides in the handling of the 'url' argument within the template file located at publiccms-parent/publiccms/src/main/resources/templates/admin/cmsDiy/preview.html. An attacker can manipulate this 'url' parameter to redirect users to arbitrary external websites. This type of vulnerability is classified as an open redirect, which can be exploited remotely without requiring authentication. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The vector details show that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, which actually means low privileges required), and user interaction is required (UI:P). The impact on confidentiality is none (VC:N), integrity is low (VI:L), and availability is none (VA:N). The vulnerability does not affect system confidentiality or availability but can impact integrity by redirecting users to malicious sites, potentially facilitating phishing, malware distribution, or social engineering attacks. A patch has been developed and is referenced by commit hashes c1e79f124e3f4c458315d908ed7dee06f9f12a76 and f1af17af004ca9345c6fe4d5936d87d008d26e75, and it is strongly recommended to apply this patch to remediate the issue. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using Sanluan PublicCMS, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Attackers can craft URLs that appear to originate from trusted internal CMS domains but redirect users to malicious external sites, potentially leading to credential theft, malware infection, or other fraud. This can undermine user trust in the affected organization's web properties and may lead to reputational damage. While the vulnerability does not directly compromise system confidentiality or availability, the indirect consequences of successful phishing or malware campaigns can be significant. Organizations in sectors with high reliance on web content management systems, such as media, education, government, and e-commerce, are particularly at risk. The requirement for user interaction means that user awareness and training are critical components of risk mitigation. Additionally, the vulnerability could be leveraged as part of a multi-stage attack chain, increasing its potential impact.
Mitigation Recommendations
1. Immediate application of the official patch referenced by the commit hashes to Sanluan PublicCMS is the most effective mitigation. 2. Implement strict input validation and output encoding for URL parameters within the CMS to prevent manipulation of redirect targets. 3. Employ Content Security Policy (CSP) headers to restrict the domains to which users can be redirected. 4. Use web application firewalls (WAFs) to detect and block suspicious redirect patterns or anomalous URL parameters. 5. Conduct user awareness training to educate users about the risks of clicking on unexpected links, especially those that appear to redirect externally. 6. Monitor web server logs for unusual redirect activities or spikes in traffic to unknown external domains. 7. Consider implementing multi-factor authentication (MFA) for CMS administrative access to reduce the risk of further compromise if phishing is successful. 8. Regularly audit and review CMS templates and code for similar vulnerabilities to proactively identify and remediate issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-21T09:23:13.038Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687ef0e1a83201eaac16c9d9
Added to database: 7/22/2025, 2:01:05 AM
Last enriched: 7/22/2025, 2:16:10 AM
Last updated: 10/20/2025, 10:01:07 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million
MediumMany Online Services and Websites Affected by an AWS Outage, (Mon, Oct 20th)
MediumCVE-2025-41028: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Grupo Castilla Epsilon RH
CriticalCVE-2025-57837: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor FCP-AN10
LowCVE-2025-31342: CWE-434 Unrestricted Upload of File with Dangerous Type in Galaxy Software Services Corporation Vitals ESP
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.