Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0712: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in SICK AG Incoming Goods Suite

0
High
VulnerabilityCVE-2026-0712cvecve-2026-0712cwe-601
Published: Thu Jan 15 2026 (01/15/2026, 13:10:14 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: Incoming Goods Suite

Description

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XSS. Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01

AI-Powered Analysis

AILast updated: 01/15/2026, 13:33:42 UTC

Technical Analysis

CVE-2026-0712 is an open redirect vulnerability categorized under CWE-601, discovered in the Incoming Goods Suite product by SICK AG, which integrates Grafana OSS components starting from version 11.5.0. The vulnerability allows an attacker to craft URLs that redirect users to malicious external sites without proper validation. This open redirect can be exploited in combination with path traversal vulnerabilities to perform cross-site scripting (XSS) attacks, potentially leading to session hijacking, credential theft, or delivery of malicious payloads. The vulnerability has a CVSS 3.1 base score of 7.6, reflecting its high severity due to network exploitability (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact includes high confidentiality loss, low integrity loss, and low availability loss. The vulnerability was introduced in Grafana OSS version 11.5.0 and fixed in subsequent security releases (12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, and 11.3.8+security-01). No known exploits have been reported in the wild yet, but the chaining potential with path traversal vulnerabilities increases the attack surface. The vulnerability affects organizations using the Incoming Goods Suite in industrial and supply chain contexts, where Grafana OSS is used for monitoring and visualization. Attackers could leverage this flaw to redirect users to phishing sites or inject malicious scripts, compromising user sessions and data confidentiality.

Potential Impact

For European organizations, the impact of CVE-2026-0712 is significant, particularly for those in manufacturing, logistics, and industrial automation sectors that rely on SICK AG's Incoming Goods Suite and Grafana OSS for operational monitoring and management. Exploitation could lead to unauthorized disclosure of sensitive operational data, user credential theft, and potential disruption of supply chain visibility. The confidentiality impact is high as attackers can redirect users to malicious sites or execute XSS attacks to steal session tokens or credentials. Integrity impact is lower but still present due to possible injection of malicious scripts. Availability impact is limited but could occur if attackers use the vulnerability to disrupt user access or inject denial-of-service payloads. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability. Given the critical role of industrial monitoring in European manufacturing hubs, successful exploitation could have cascading effects on production efficiency and safety compliance.

Mitigation Recommendations

European organizations should immediately verify their use of SICK AG's Incoming Goods Suite and the specific Grafana OSS versions in their environments. Applying the security patches released in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, or 11.3.8+security-01 is essential to remediate the vulnerability. In addition to patching, organizations should implement strict input validation and sanitization on all URL parameters that control redirects to prevent open redirect exploitation. Web application firewalls (WAFs) can be configured to detect and block suspicious redirect patterns and path traversal attempts. Security teams should conduct phishing awareness training to reduce the risk of user interaction exploitation. Regular security audits and penetration testing focusing on chained vulnerabilities like open redirect combined with path traversal should be performed. Network segmentation and least privilege principles should be enforced to limit the impact of any successful exploit. Monitoring and logging of redirect activities and anomalous user behavior can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-08T09:59:08.086Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968e9244c611209ad0e7126

Added to database: 1/15/2026, 1:18:28 PM

Last enriched: 1/15/2026, 1:33:42 PM

Last updated: 1/15/2026, 7:52:16 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats