CVE-2025-7785
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-18

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability classified as problematic was found in thinkgem JeeSite up to 5.12.0. This vulnerability affects the function sso of the file src/main/java/com/jeesite/modules/sys/web/SsoController.java. The manipulation of the argument redirect leads to open redirect. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-18
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-07-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
jeesite jeesite to 5.12.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-7785 is an Open Redirect vulnerability in the thinkgem JeeSite software up to version 5.12.0. It occurs in the Single Sign-On (SSO) controller's sso function, where the 'redirect' or 'url' parameter is user-controllable and improperly validated. This allows an attacker to manipulate the redirect destination to an arbitrary external URL. As a result, users can be redirected to malicious websites without their knowledge, facilitating phishing attacks or other malicious activities. [1, 3, 4]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to redirect users of the JeeSite application to malicious external websites. This can lead to phishing attacks, where users might be tricked into providing sensitive information or downloading malware. Since the vulnerability can be exploited remotely without authentication and requires only user interaction, it poses a risk to the integrity and trustworthiness of the application and its users. [1, 3, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the SSO endpoint `/sso/{username}/{token}` for open redirect behavior. You can attempt to access the endpoint with a crafted URL parameter that points to an external site, for example: `http://yourserver/js/sso/system/x?url=http://malicious-site.com/&relogin=0`. If the application redirects to the external URL without validation, the vulnerability is present. A simple curl command to test this could be: curl -v "http://yourserver/js/sso/system/x?url=http://malicious-site.com/&relogin=0" -L Observe if the response redirects to the external URL. If yes, the system is vulnerable. [4]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to apply the official patch identified by commit `3d06b8d009d0267f0255acc87ea19d29d07cedc3` which restricts allowed redirect URLs to internal project domains only. This involves updating the `allowRedirects` configuration in the files `jeesite-core.yml`, `web-api/src/main/resources/config/application.yml`, and `web/src/main/resources/config/application.yml` to limit redirects to internal URLs (e.g., setting `allowRedirects` to "this"). Until the patch is applied, avoid exposing the vulnerable SSO redirect endpoint or implement temporary input validation to restrict redirect URLs to trusted domains. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart