CVE-2025-41075

7.5 HIGH

📋 TL;DR

This vulnerability in LimeSurvey 6.13.0 creates an infinite redirect loop when accessing the /optin endpoint directly. Attackers can exploit this to cause denial of service by exhausting server or client resources. Organizations running vulnerable LimeSurvey instances are affected.

💻 Affected Systems

Products:
  • LimeSurvey
Versions: 6.13.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific /optin endpoint in LimeSurvey 6.13.0

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to resource exhaustion, potentially affecting all users of the LimeSurvey instance and causing browser crashes for clients.

🟠

Likely Case

Service degradation with intermittent availability issues and potential browser instability for users accessing the vulnerable endpoint.

🟢

If Mitigated

Minimal impact with proper network controls and monitoring in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to the vulnerable endpoint, making it trivial to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.13.1 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-limesurvey-0

Restart Required: Yes

Instructions:

1. Backup your LimeSurvey installation and database. 2. Download the latest version from the official LimeSurvey repository. 3. Replace the vulnerable files with the patched version. 4. Restart your web server. 5. Verify the fix by testing the /optin endpoint.

🔧 Temporary Workarounds

Block /optin endpoint at web server level

all

Configure web server to block or redirect requests to the vulnerable /optin endpoint

# Apache: RewriteRule ^/optin - [F]
# Nginx: location = /optin { return 403; }

Implement rate limiting

all

Configure rate limiting on the /optin endpoint to prevent DoS attacks

# Apache with mod_evasive: DOSPageCount 2
# Nginx: limit_req_zone $binary_remote_addr zone=optin:10m rate=1r/s;

🧯 If You Can't Patch

  • Implement WAF rules to block or rate limit requests to /optin endpoint
  • Monitor server logs for excessive requests to /optin and implement alerting

🔍 How to Verify

Check if Vulnerable:

Access http://your-limesurvey-instance/optin directly and observe if it creates an infinite redirect loop

Check Version:

Check the version.php file in LimeSurvey installation or use the admin interface

Verify Fix Applied:

After patching, access the /optin endpoint and verify it no longer creates redirect loops

📡 Detection & Monitoring

Log Indicators:

  • Excessive 301/302 redirects from /optin endpoint
  • High number of requests to /optin in short timeframes
  • Increased server resource usage

Network Indicators:

  • Multiple HTTP redirect responses from same endpoint
  • Unusual traffic patterns to /optin endpoint

SIEM Query:

source="web_server_logs" AND (url="/optin" AND status="301" OR status="302") | stats count by src_ip

🔗 References

📤 Share & Export