CVE-2025-26394
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-10

Last updated on: 2025-11-12

Assigner: SolarWinds

Description
SolarWinds Observability Self-Hosted is susceptible to an open redirection vulnerability. The URL is not properly sanitized, and an attacker could manipulate the string to redirect a user to a malicious site. The attack complexity is high, and authentication is required.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-10
Last Modified
2025-11-12
Generated
2026-05-07
AI Q&A
2025-06-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
solarwinds observability_self-hosted to 2025.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an open redirection issue in SolarWinds Observability Self-Hosted (SWOSH) versions 2025.1.1 and earlier. It occurs because the URL input is not properly sanitized, allowing an attacker to manipulate the URL string to redirect users to malicious websites. Exploiting this requires high attack complexity and user authentication. [1]


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker to redirect users to malicious sites, potentially leading to confidentiality breaches. According to the CVSS score, it has a high confidentiality impact but does not affect integrity or availability. The attack requires low privileges and no user interaction but is complex and requires authentication. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this open redirection vulnerability involves checking if the SolarWinds Observability Self-Hosted (SWOSH) version is 2025.1.1 or earlier and testing URL inputs for improper sanitization that could lead to redirection to malicious sites. Specific commands are not provided in the available resources. However, network monitoring for unusual outbound redirects or scanning the application URLs for redirection behavior could help identify exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade SolarWinds SWOSH to version 2025.2 or later, where this open redirection vulnerability has been fixed. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart