CVE-2025-12789
BaseFortify
Publication date: 2025-11-07
Last updated on: 2025-11-12
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| red_hat | single_sign-on | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Open Redirect flaw in Red Hat Single Sign-On that occurs during the logout process. Specifically, the redirect_uri parameter used in the openid-connect logout protocol does not properly validate the URL provided, allowing attackers to redirect users to potentially malicious sites.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to redirect users to malicious websites during logout, potentially leading to phishing attacks or other malicious activities. It can undermine user trust and may expose users to further security risks.