CVE-2025-10229

4.3 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in Freshwork's logout endpoint. Attackers can manipulate the post_logout_redirect_uri parameter to redirect users to malicious websites after logout. This affects Freshwork installations up to version 1.2.3.

💻 Affected Systems

Products:
  • Freshwork
Versions: up to 1.2.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the /api/v2/logout endpoint and requires the application to be accessible to attackers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers use the redirect for phishing campaigns, tricking users into entering credentials on fake login pages.

🟢

If Mitigated

With proper user awareness training and browser security controls, users might recognize suspicious redirects before entering sensitive information.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details have been publicly disclosed and can be executed remotely. Attackers need to trick users into clicking a crafted logout link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.3

Vendor Advisory: Not provided

Restart Required: No

Instructions:

1. Upgrade Freshwork to version 1.2.3 or later. 2. Verify the update was successful by checking the version. 3. Test the logout functionality to ensure redirects are properly validated.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to restrict redirect URLs to trusted domains only

WAF Rule

all

Configure web application firewall to block requests with suspicious redirect parameters

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict redirect destinations
  • Monitor logs for suspicious redirect patterns and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Test the /api/v2/logout endpoint with a malicious post_logout_redirect_uri parameter to see if it redirects to an external domain

Check Version:

Check Freshwork configuration or admin panel for version information

Verify Fix Applied:

After patching, test with the same malicious parameter and verify it either blocks the redirect or redirects to a safe default location

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in application logs
  • Multiple logout requests with external URLs in parameters

Network Indicators:

  • HTTP 302 redirects to external domains after logout requests

SIEM Query:

source="freshwork.logs" AND uri="/api/v2/logout" AND (post_logout_redirect_uri CONTAINS "http://" OR post_logout_redirect_uri CONTAINS "https://")

🔗 References

📤 Share & Export