CVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
A flaw has been found in TOTVS Portal Meu RH up to 12.1.17. Impacted is an unknown function of the component Password Reset Handler. Executing manipulation of the argument redirectUrl can lead to open redirect. The attack may be performed from a remote location. The exploit has been published and may be used. Upgrading to version 12.1.2410.274, 12.1.2502.178 and 12.1.2506.121 is recommended to address this issue. It is recommended to upgrade the affected component. The vendor explains, that "[o]ur internal validation (...) confirms that the reported behavior does not exist in currently supported releases. In these tests, the redirectUrl parameter is ignored, and no malicious redirection occurs." This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-9193 is a medium-severity open redirect vulnerability identified in the TOTVS Portal Meu RH product, specifically affecting versions up to 12.1.17. The vulnerability resides in the Password Reset Handler component, where manipulation of the redirectUrl argument can lead to an open redirect condition. This flaw allows an attacker to craft a malicious URL that, when clicked by a user, redirects them to an arbitrary external site. The vulnerability can be exploited remotely without authentication, although user interaction is required to trigger the redirect. The vendor has indicated that this issue does not exist in currently supported releases, as the redirectUrl parameter is ignored in those versions. However, the affected versions are no longer supported, and the vulnerability remains present in them. Exploit code has been published, increasing the risk of exploitation. The CVSS 4.0 base score is 5.1, reflecting a medium severity level due to the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality and availability is minimal, but the integrity of user trust and potential for phishing or social engineering attacks is significant. The vulnerability does not affect the availability or integrity of the system directly but can be leveraged to redirect users to malicious sites, potentially facilitating further attacks such as credential theft or malware delivery. The recommended mitigation is to upgrade to versions 12.1.2410.274, 12.1.2502.178, or 12.1.2506.121, where the vulnerability has been addressed by ignoring the redirectUrl parameter. Since the affected versions are no longer supported, organizations still running these versions should prioritize upgrading or consider alternative mitigations such as implementing web application firewalls (WAFs) to detect and block malicious redirect attempts.
Potential Impact
For European organizations using TOTVS Portal Meu RH versions up to 12.1.17, this vulnerability poses a risk primarily related to user trust and phishing attacks. Attackers can exploit the open redirect to lure users into visiting malicious websites under the guise of legitimate password reset flows, potentially leading to credential compromise or malware infections. While the direct impact on system confidentiality, integrity, or availability is limited, the indirect consequences can be severe, especially in sectors handling sensitive employee or HR data. This could result in reputational damage, regulatory scrutiny under GDPR for insufficient protection of user data, and potential financial losses. Organizations relying on unsupported versions face increased risk due to the lack of vendor patches and official support. The presence of published exploits heightens the urgency for mitigation. Additionally, since the vulnerability requires user interaction, the effectiveness of social engineering campaigns may increase, targeting employees to exploit the flaw.
Mitigation Recommendations
1. Immediate upgrade to supported TOTVS Portal Meu RH versions (12.1.2410.274, 12.1.2502.178, or 12.1.2506.121) that have addressed the vulnerability by ignoring the redirectUrl parameter. 2. For organizations unable to upgrade promptly, deploy web application firewalls (WAFs) with rules to detect and block suspicious redirectUrl parameters or unusual redirect patterns in HTTP requests. 3. Implement strict input validation and sanitization on URL parameters at the application or proxy level to prevent open redirect exploitation. 4. Conduct user awareness training focusing on phishing and social engineering risks, emphasizing caution when clicking on password reset or similar links. 5. Monitor logs for unusual redirect activities or spikes in password reset requests that could indicate exploitation attempts. 6. Consider isolating or restricting access to the affected Portal Meu RH instances until upgrades can be applied, especially if exposed to the internet. 7. Review and update incident response plans to include scenarios involving open redirect exploitation and phishing campaigns.
Affected Countries
Portugal, Spain, Italy, Germany, France, United Kingdom, Netherlands, Belgium
CVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
Description
A flaw has been found in TOTVS Portal Meu RH up to 12.1.17. Impacted is an unknown function of the component Password Reset Handler. Executing manipulation of the argument redirectUrl can lead to open redirect. The attack may be performed from a remote location. The exploit has been published and may be used. Upgrading to version 12.1.2410.274, 12.1.2502.178 and 12.1.2506.121 is recommended to address this issue. It is recommended to upgrade the affected component. The vendor explains, that "[o]ur internal validation (...) confirms that the reported behavior does not exist in currently supported releases. In these tests, the redirectUrl parameter is ignored, and no malicious redirection occurs." This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-9193 is a medium-severity open redirect vulnerability identified in the TOTVS Portal Meu RH product, specifically affecting versions up to 12.1.17. The vulnerability resides in the Password Reset Handler component, where manipulation of the redirectUrl argument can lead to an open redirect condition. This flaw allows an attacker to craft a malicious URL that, when clicked by a user, redirects them to an arbitrary external site. The vulnerability can be exploited remotely without authentication, although user interaction is required to trigger the redirect. The vendor has indicated that this issue does not exist in currently supported releases, as the redirectUrl parameter is ignored in those versions. However, the affected versions are no longer supported, and the vulnerability remains present in them. Exploit code has been published, increasing the risk of exploitation. The CVSS 4.0 base score is 5.1, reflecting a medium severity level due to the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality and availability is minimal, but the integrity of user trust and potential for phishing or social engineering attacks is significant. The vulnerability does not affect the availability or integrity of the system directly but can be leveraged to redirect users to malicious sites, potentially facilitating further attacks such as credential theft or malware delivery. The recommended mitigation is to upgrade to versions 12.1.2410.274, 12.1.2502.178, or 12.1.2506.121, where the vulnerability has been addressed by ignoring the redirectUrl parameter. Since the affected versions are no longer supported, organizations still running these versions should prioritize upgrading or consider alternative mitigations such as implementing web application firewalls (WAFs) to detect and block malicious redirect attempts.
Potential Impact
For European organizations using TOTVS Portal Meu RH versions up to 12.1.17, this vulnerability poses a risk primarily related to user trust and phishing attacks. Attackers can exploit the open redirect to lure users into visiting malicious websites under the guise of legitimate password reset flows, potentially leading to credential compromise or malware infections. While the direct impact on system confidentiality, integrity, or availability is limited, the indirect consequences can be severe, especially in sectors handling sensitive employee or HR data. This could result in reputational damage, regulatory scrutiny under GDPR for insufficient protection of user data, and potential financial losses. Organizations relying on unsupported versions face increased risk due to the lack of vendor patches and official support. The presence of published exploits heightens the urgency for mitigation. Additionally, since the vulnerability requires user interaction, the effectiveness of social engineering campaigns may increase, targeting employees to exploit the flaw.
Mitigation Recommendations
1. Immediate upgrade to supported TOTVS Portal Meu RH versions (12.1.2410.274, 12.1.2502.178, or 12.1.2506.121) that have addressed the vulnerability by ignoring the redirectUrl parameter. 2. For organizations unable to upgrade promptly, deploy web application firewalls (WAFs) with rules to detect and block suspicious redirectUrl parameters or unusual redirect patterns in HTTP requests. 3. Implement strict input validation and sanitization on URL parameters at the application or proxy level to prevent open redirect exploitation. 4. Conduct user awareness training focusing on phishing and social engineering risks, emphasizing caution when clicking on password reset or similar links. 5. Monitor logs for unusual redirect activities or spikes in password reset requests that could indicate exploitation attempts. 6. Consider isolating or restricting access to the affected Portal Meu RH instances until upgrades can be applied, especially if exposed to the internet. 7. Review and update incident response plans to include scenarios involving open redirect exploitation and phishing campaigns.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T17:13:21.967Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a5142bad5a09ad00fc988d
Added to database: 8/20/2025, 12:17:47 AM
Last enriched: 8/27/2025, 1:02:25 AM
Last updated: 10/1/2025, 10:01:14 PM
Views: 51
Related Threats
CVE-2025-9952: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-9886: CWE-352 Cross-Site Request Forgery (CSRF) in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-10383: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-61895
LowCVE-2025-61894
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.