Skip to main content

CVE-2025-7953: Open Redirect in Sanluan PublicCMS

Medium
VulnerabilityCVE-2025-7953cvecve-2025-7953
Published: Tue Jul 22 2025 (07/22/2025, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Sanluan
Product: PublicCMS

Description

A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS up to 5.202506.a. This issue affects some unknown processing of the file publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. The manipulation of the argument File leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named f1af17af004ca9345c6fe4d5936d87d008d26e75. It is recommended to apply a patch to fix this issue.

AI-Powered Analysis

AILast updated: 07/22/2025, 04:01:14 UTC

Technical Analysis

CVE-2025-7953 is an open redirect vulnerability identified in Sanluan PublicCMS versions up to 5.202506.a. The vulnerability arises from improper handling of the 'File' argument in the file located at publiccms-parent/publiccms/src/main/webapp/resource/plugins/pdfjs/viewer.html. An attacker can manipulate this argument to craft a URL that redirects users to arbitrary external websites. This type of vulnerability is classified as an open redirect, which can be exploited remotely without requiring authentication. The vulnerability has been publicly disclosed, and a patch (commit f1af17af004ca9345c6fe4d5936d87d008d26e75) is available to remediate the issue. The CVSS v4.0 base score is 5.1, indicating a medium severity level. The vector details show that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but does require user interaction (UI:P). The impact on confidentiality is none (C:N), on integrity is low (I:L), and no impact on availability (A:N). This vulnerability does not affect system confidentiality or availability but can be leveraged in phishing attacks, session hijacking, or redirecting users to malicious sites, potentially leading to further exploitation or social engineering attacks. No known exploits are currently in the wild, but public disclosure increases the risk of exploitation attempts.

Potential Impact

For European organizations using Sanluan PublicCMS, this vulnerability poses a moderate risk primarily related to user trust and potential phishing campaigns. Attackers could exploit the open redirect to trick users into visiting malicious websites, potentially leading to credential theft, malware infections, or other social engineering attacks. This can damage brand reputation and user confidence, especially for public-facing websites or portals. While the direct impact on system integrity and availability is low, the indirect consequences through user exploitation can be significant. Organizations in sectors with high user interaction such as e-commerce, government portals, and educational platforms may face increased risk. Additionally, regulatory frameworks like GDPR emphasize protecting user data and preventing fraud, so exploitation could lead to compliance issues if user data is compromised through secondary attacks.

Mitigation Recommendations

European organizations should promptly apply the available patch (commit f1af17af004ca9345c6fe4d5936d87d008d26e75) to Sanluan PublicCMS to remediate the open redirect vulnerability. Beyond patching, it is recommended to implement strict input validation and sanitization on URL parameters, particularly the 'File' argument in the affected viewer.html component. Employing Content Security Policy (CSP) headers can help mitigate the impact of malicious redirects by restricting the domains to which users can be redirected. Organizations should also monitor web server logs for unusual redirect patterns and conduct regular security assessments on public-facing CMS instances. User awareness training to recognize phishing attempts leveraging redirects can reduce the risk of successful exploitation. Finally, consider implementing web application firewalls (WAFs) with rules to detect and block suspicious redirect attempts targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-21T09:55:22.387Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687f097da83201eaac17c927

Added to database: 7/22/2025, 3:46:05 AM

Last enriched: 7/22/2025, 4:01:14 AM

Last updated: 8/29/2025, 9:38:55 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats