CVE-2025-11222
📋 TL;DR
Central Dogma versions before 0.78.0 contain an open redirect vulnerability that allows attackers to craft malicious URLs that redirect users to untrusted external websites. This affects all users of vulnerable Central Dogma instances who click on specially crafted links, potentially leading to phishing attacks and credential theft.
💻 Affected Systems
- Central Dogma
📦 What is this software?
Central Dogma by Linecorp
⚠️ Risk & Real-World Impact
Worst Case
Attackers successfully redirect users to convincing phishing sites that harvest credentials, session tokens, or install malware, leading to full account compromise and lateral movement.
Likely Case
Users are redirected to phishing pages attempting to steal credentials or session information, with success depending on user awareness and security controls.
If Mitigated
Users are redirected but security controls like multi-factor authentication, email warnings, or browser protections prevent credential theft.
🎯 Exploit Status
Open redirect vulnerabilities are typically easy to exploit with simple URL manipulation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.78.0
Vendor Advisory: https://github.com/line/centraldogma/security/advisories/GHSA-4hr2-xf7w-jf76
Restart Required: Yes
Instructions:
1. Stop Central Dogma service. 2. Update to version 0.78.0 or later. 3. Restart Central Dogma service. 4. Verify the update was successful.
🔧 Temporary Workarounds
URL Validation Filter
allImplement server-side validation to reject URLs with external domains in redirect parameters.
Reverse Proxy Filtering
allConfigure reverse proxy (nginx, Apache) to block redirects to external domains.
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to detect and block open redirect attempts.
- Educate users about phishing risks and implement email/link scanning for suspicious redirects.
🔍 How to Verify
Check if Vulnerable:
Check Central Dogma version. If version is below 0.78.0, the system is vulnerable.
Check Version:
Check Central Dogma logs or configuration for version information.
Verify Fix Applied:
After updating, test redirect functionality with external URLs to ensure they are blocked or validated.
📡 Detection & Monitoring
Log Indicators:
- Unusual redirect patterns in access logs
- Requests with external URLs in parameters
Network Indicators:
- HTTP 302/301 redirects to external domains
- Suspicious referrer patterns
SIEM Query:
http.status_code IN (301, 302) AND url.query CONTAINS "redirect=" AND NOT url.domain IN allowed_domains