CVE-2025-10355
BaseFortify
Publication date: 2025-10-23
Last updated on: 2025-10-27
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| molgenis | emx2 | 11.14.0 |
| molgenis | emx2 | 13.19.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-10355 is an open redirection vulnerability in MOLGENIS EMX2 version 11.14.0. It allows an attacker to create a malicious URL by manipulating a redirection parameter using the pattern '/%2f%2f<MALICIOUS_DOMAIN>'. This causes users who click the crafted URL to be redirected to phishing sites or other harmful destinations. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by exposing users to phishing attacks or other malicious sites if they click on a manipulated URL. This can lead to credential theft, malware infection, or other security risks due to the redirection to untrusted sites. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by monitoring for URLs containing the manipulated redirection pattern "/%2f%2f<MALICIOUS_DOMAIN>" in your web server logs or network traffic. Searching for requests with suspicious redirection parameters that include double-encoded slashes ("%2f%2f") followed by unknown or untrusted domains can indicate exploitation attempts. For example, using command-line tools like grep on server logs: grep -i '%2f%2f' /path/to/access.log. Additionally, inspecting HTTP requests for redirection parameters that contain suspicious domains can help identify attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating MOLGENIS EMX2 to version 13.19.4 or later, where the vulnerability has been fixed. If an immediate update is not possible, consider implementing input validation or filtering on redirection parameters to block or sanitize URLs containing the pattern "/%2f%2f" or suspicious domains. Additionally, educating users about phishing risks and monitoring for suspicious redirection attempts can help reduce impact. [1]