CVE-2025-7785
BaseFortify
Publication date: 2025-07-18
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jeesite | jeesite | to 5.12.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-7785 is an Open Redirect vulnerability in the thinkgem JeeSite software up to version 5.12.0. It occurs in the Single Sign-On (SSO) controller's sso function, where the 'redirect' or 'url' parameter is user-controllable and improperly validated. This allows an attacker to manipulate the redirect destination to an arbitrary external URL. As a result, users can be redirected to malicious websites without their knowledge, facilitating phishing attacks or other malicious activities. [1, 3, 4]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to redirect users of the JeeSite application to malicious external websites. This can lead to phishing attacks, where users might be tricked into providing sensitive information or downloading malware. Since the vulnerability can be exploited remotely without authentication and requires only user interaction, it poses a risk to the integrity and trustworthiness of the application and its users. [1, 3, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the SSO endpoint `/sso/{username}/{token}` for open redirect behavior. You can attempt to access the endpoint with a crafted URL parameter that points to an external site, for example: `http://yourserver/js/sso/system/x?url=http://malicious-site.com/&relogin=0`. If the application redirects to the external URL without validation, the vulnerability is present. A simple curl command to test this could be: curl -v "http://yourserver/js/sso/system/x?url=http://malicious-site.com/&relogin=0" -L Observe if the response redirects to the external URL. If yes, the system is vulnerable. [4]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to apply the official patch identified by commit `3d06b8d009d0267f0255acc87ea19d29d07cedc3` which restricts allowed redirect URLs to internal project domains only. This involves updating the `allowRedirects` configuration in the files `jeesite-core.yml`, `web-api/src/main/resources/config/application.yml`, and `web/src/main/resources/config/application.yml` to limit redirects to internal URLs (e.g., setting `allowRedirects` to "this"). Until the patch is applied, avoid exposing the vulnerable SSO redirect endpoint or implement temporary input validation to restrict redirect URLs to trusted domains. [2]