CVE-2025-70032
Received Received - Intake
Open Redirect Vulnerability in SunbirdEd-portal v

Publication date: 2026-03-09

Last updated on: 2026-04-01

Assigner: MITRE

Description
An issue pertaining to CWE-601: URL Redirection to Untrusted Site was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sunbird sunbirded-portal 1.13.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-70032 is a vulnerability in SunbirdEd-portal version 1.13.4 related to CWE-601, which is URL Redirection to Untrusted Site.

This flaw allows attackers to exploit the application by redirecting users to malicious or untrusted websites due to improper handling of URL redirection parameters.


How can this vulnerability impact me? :

The vulnerability can impact users by enabling attackers to redirect them to malicious websites, which can facilitate phishing attacks.

Such redirections may also lead to the exposure of sensitive user information.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

CVE-2025-70032 is a URL Redirection to Untrusted Site vulnerability in SunbirdEd-portal version 1.13.4. To mitigate this vulnerability, it is important to ensure that URL redirection parameters are properly validated and sanitized to prevent redirection to malicious or untrusted websites.

Immediate steps include reviewing and updating the application code to validate redirect URLs against a whitelist of trusted domains, or disabling open redirects if possible.

Additionally, monitor user reports and logs for suspicious redirect behavior and consider applying any available patches or updates from the vendor.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart