CVE-2025-10355
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-23

Last updated on: 2025-10-27

Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)

Description
Open redirection vulnerability in MOLGENIS EMX2 v11.14.0. This vulnerability allows an attacker to create a malicious URL using a manipulated redirection parameter, potentially leading users to phishing sites or other malicious destinations via β€œ/%2f%2f<MALICIOUS_DOMAIN>”.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-23
Last Modified
2025-10-27
Generated
2026-05-07
AI Q&A
2025-10-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
molgenis emx2 11.14.0
molgenis emx2 13.19.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-10355 is an open redirection vulnerability in MOLGENIS EMX2 version 11.14.0. It allows an attacker to create a malicious URL by manipulating a redirection parameter using the pattern '/%2f%2f<MALICIOUS_DOMAIN>'. This causes users who click the crafted URL to be redirected to phishing sites or other harmful destinations. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by exposing users to phishing attacks or other malicious sites if they click on a manipulated URL. This can lead to credential theft, malware infection, or other security risks due to the redirection to untrusted sites. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by monitoring for URLs containing the manipulated redirection pattern "/%2f%2f<MALICIOUS_DOMAIN>" in your web server logs or network traffic. Searching for requests with suspicious redirection parameters that include double-encoded slashes ("%2f%2f") followed by unknown or untrusted domains can indicate exploitation attempts. For example, using command-line tools like grep on server logs: grep -i '%2f%2f' /path/to/access.log. Additionally, inspecting HTTP requests for redirection parameters that contain suspicious domains can help identify attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating MOLGENIS EMX2 to version 13.19.4 or later, where the vulnerability has been fixed. If an immediate update is not possible, consider implementing input validation or filtering on redirection parameters to block or sanitize URLs containing the pattern "/%2f%2f" or suspicious domains. Additionally, educating users about phishing risks and monitoring for suspicious redirection attempts can help reduce impact. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart