CVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
A flaw has been found in TOTVS Portal Meu RH up to 12.1.17. Impacted is an unknown function of the component Password Reset Handler. Executing manipulation of the argument redirectUrl can lead to open redirect. The attack may be performed from a remote location. The exploit has been published and may be used. Upgrading to version 12.1.2410.274, 12.1.2502.178 and 12.1.2506.121 is recommended to address this issue. It is recommended to upgrade the affected component. The vendor explains, that "[o]ur internal validation (...) confirms that the reported behavior does not exist in currently supported releases. In these tests, the redirectUrl parameter is ignored, and no malicious redirection occurs." This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-9193 is an open redirect vulnerability identified in the TOTVS Portal Meu RH product, specifically affecting versions up to 12.1.17. The vulnerability resides in the Password Reset Handler component, where manipulation of the 'redirectUrl' parameter can lead to an open redirect condition. This means an attacker can craft a URL that appears to be legitimate but redirects users to a malicious external site. The vulnerability can be exploited remotely without authentication, although user interaction is required to trigger the redirect. The CVSS 4.0 score is 5.1 (medium severity), reflecting that the attack vector is network-based with low attack complexity, no privileges required, but requires user interaction. The impact on confidentiality and availability is minimal, but integrity is slightly affected due to potential phishing or social engineering attacks leveraging the redirect. The vendor has stated that this vulnerability affects only unsupported versions of the product and that currently supported releases ignore the 'redirectUrl' parameter, preventing malicious redirection. Upgrading to versions 12.1.2410.274, 12.1.2502.178, or 12.1.2506.121 is recommended to mitigate the issue. No known exploits are currently in the wild, but proof-of-concept code has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using TOTVS Portal Meu RH versions up to 12.1.17, this vulnerability poses a risk primarily related to phishing and social engineering attacks. An attacker could exploit the open redirect to trick employees into visiting malicious websites, potentially leading to credential theft or malware infection. While the vulnerability does not directly compromise system confidentiality or availability, the indirect consequences could be significant if attackers use the redirect to facilitate further attacks. Organizations in sectors with sensitive HR data or critical infrastructure could face reputational damage and regulatory scrutiny if such attacks succeed. Since the affected versions are no longer supported, organizations still running these versions are at increased risk due to the lack of official patches and support.
Mitigation Recommendations
European organizations should prioritize upgrading TOTVS Portal Meu RH to the latest supported versions (12.1.2410.274, 12.1.2502.178, or 12.1.2506.121) where the vulnerability is addressed. For environments where immediate upgrade is not feasible, implementing web application firewalls (WAF) with rules to detect and block suspicious redirect URL parameters can reduce risk. Additionally, organizations should conduct user awareness training focused on recognizing phishing attempts and suspicious links, especially those involving password reset or HR portals. Monitoring web server logs for unusual redirectUrl parameter usage can help detect exploitation attempts. Finally, organizations should review and restrict access to the Password Reset Handler component to trusted networks or users where possible to limit exposure.
Affected Countries
Portugal, Spain, Italy, Germany, France, United Kingdom, Netherlands, Belgium
CVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
Description
A flaw has been found in TOTVS Portal Meu RH up to 12.1.17. Impacted is an unknown function of the component Password Reset Handler. Executing manipulation of the argument redirectUrl can lead to open redirect. The attack may be performed from a remote location. The exploit has been published and may be used. Upgrading to version 12.1.2410.274, 12.1.2502.178 and 12.1.2506.121 is recommended to address this issue. It is recommended to upgrade the affected component. The vendor explains, that "[o]ur internal validation (...) confirms that the reported behavior does not exist in currently supported releases. In these tests, the redirectUrl parameter is ignored, and no malicious redirection occurs." This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-9193 is an open redirect vulnerability identified in the TOTVS Portal Meu RH product, specifically affecting versions up to 12.1.17. The vulnerability resides in the Password Reset Handler component, where manipulation of the 'redirectUrl' parameter can lead to an open redirect condition. This means an attacker can craft a URL that appears to be legitimate but redirects users to a malicious external site. The vulnerability can be exploited remotely without authentication, although user interaction is required to trigger the redirect. The CVSS 4.0 score is 5.1 (medium severity), reflecting that the attack vector is network-based with low attack complexity, no privileges required, but requires user interaction. The impact on confidentiality and availability is minimal, but integrity is slightly affected due to potential phishing or social engineering attacks leveraging the redirect. The vendor has stated that this vulnerability affects only unsupported versions of the product and that currently supported releases ignore the 'redirectUrl' parameter, preventing malicious redirection. Upgrading to versions 12.1.2410.274, 12.1.2502.178, or 12.1.2506.121 is recommended to mitigate the issue. No known exploits are currently in the wild, but proof-of-concept code has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using TOTVS Portal Meu RH versions up to 12.1.17, this vulnerability poses a risk primarily related to phishing and social engineering attacks. An attacker could exploit the open redirect to trick employees into visiting malicious websites, potentially leading to credential theft or malware infection. While the vulnerability does not directly compromise system confidentiality or availability, the indirect consequences could be significant if attackers use the redirect to facilitate further attacks. Organizations in sectors with sensitive HR data or critical infrastructure could face reputational damage and regulatory scrutiny if such attacks succeed. Since the affected versions are no longer supported, organizations still running these versions are at increased risk due to the lack of official patches and support.
Mitigation Recommendations
European organizations should prioritize upgrading TOTVS Portal Meu RH to the latest supported versions (12.1.2410.274, 12.1.2502.178, or 12.1.2506.121) where the vulnerability is addressed. For environments where immediate upgrade is not feasible, implementing web application firewalls (WAF) with rules to detect and block suspicious redirect URL parameters can reduce risk. Additionally, organizations should conduct user awareness training focused on recognizing phishing attempts and suspicious links, especially those involving password reset or HR portals. Monitoring web server logs for unusual redirectUrl parameter usage can help detect exploitation attempts. Finally, organizations should review and restrict access to the Password Reset Handler component to trusted networks or users where possible to limit exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T17:13:21.967Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a5142bad5a09ad00fc988d
Added to database: 8/20/2025, 12:17:47 AM
Last enriched: 8/20/2025, 12:32:50 AM
Last updated: 8/20/2025, 3:45:58 AM
Views: 5
Related Threats
CVE-2025-8618: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpclever WPC Smart Quick View for WooCommerce
MediumCVE-2025-55706: URL redirection to untrusted site ('Open Redirect') in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2025-53522: Use of less trusted source in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2025-57788: CWE-259: Use of Hard-coded Password in Commvault CommCell
MediumCVE-2025-57791: CWE-88: Improper Neutralization of Argument Delimiters in a Command in Commvault CommCell
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.