CVE-2025-1885

5.4 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in Restajet Information Technologies' Online Food Delivery System that allows attackers to redirect users to malicious websites. Attackers can exploit this for phishing attacks by tricking users into visiting fraudulent sites. All users of the affected Online Food Delivery System versions are potentially impacted.

💻 Affected Systems

Products:
  • Restajet Information Technologies Inc. Online Food Delivery System
Versions: through 19122025
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable version range are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that steal credentials, payment information, or install malware, leading to account compromise and financial loss.

🟠

Likely Case

Attackers create convincing phishing pages that harvest user credentials or payment details through redirected links in emails or messages.

🟢

If Mitigated

With proper input validation and URL whitelisting, redirects only occur to trusted domains, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Open redirect vulnerabilities are commonly exploited in phishing campaigns and require minimal technical skill to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0469

Restart Required: No

Instructions:

Contact Restajet Information Technologies for patching guidance as no public patch is currently available.

🔧 Temporary Workarounds

Implement URL Validation

all

Add server-side validation to ensure redirect URLs are only to trusted, whitelisted domains.

WAF Rule Configuration

all

Configure web application firewall rules to block redirects to external or untrusted domains.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict redirect destinations
  • Deploy network monitoring to detect and block suspicious redirect patterns

🔍 How to Verify

Check if Vulnerable:

Test redirect functionality by attempting to redirect to external domains using URL parameters. If successful, the system is vulnerable.

Check Version:

Check system version in admin panel or configuration files; compare against '19122025'

Verify Fix Applied:

Verify that redirects only work for approved, whitelisted domains and external redirects are blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 302/301 redirect responses to external domains
  • URL parameters containing external domains in redirect requests

Network Indicators:

  • Unexpected redirects to unfamiliar domains
  • Multiple users redirected to same external site

SIEM Query:

http.status_code IN (301, 302) AND url.destination CONTAINS 'http://' AND NOT url.destination CONTAINS 'yourdomain.com'

🔗 References

📤 Share & Export