CVE-2025-69725

4.7 MEDIUM

📋 TL;DR

An open redirect vulnerability in go-chi/chi's RedirectSlashes function allows attackers to craft URLs that appear legitimate but redirect users to malicious websites. This affects applications using go-chi/chi version 5.2.2 or later with the RedirectSlashes middleware enabled. Users could be tricked into visiting phishing sites or downloading malware.

💻 Affected Systems

Products:
  • go-chi/chi
Versions: >=5.2.2
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if using the RedirectSlashes middleware. Applications not using this middleware are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that steal credentials, financial information, or deliver malware, leading to account compromise, data theft, or ransomware infection.

🟠

Likely Case

Attackers use the legitimate domain to build trust, redirecting users to phishing pages that harvest login credentials or personal information.

🟢

If Mitigated

With proper user education and browser security warnings, users might notice suspicious redirects, limiting successful attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a malicious URL with specific parameters. The vulnerability is publicly documented with examples.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.3

Vendor Advisory: https://github.com/go-chi/chi/security/advisories/GHSA-mqqf-5wvp-8fh8

Restart Required: Yes

Instructions:

1. Update go-chi/chi to version 5.2.3 or later using 'go get github.com/go-chi/chi/v5@latest'. 2. Rebuild and redeploy your application. 3. Restart the service to apply changes.

🔧 Temporary Workarounds

Disable RedirectSlashes Middleware

all

Remove or disable the RedirectSlashes middleware in your chi router configuration.

// In your Go code, remove: r.Use(middleware.RedirectSlashes)

🧯 If You Can't Patch

  • Implement URL validation to reject redirects to external domains.
  • Use Content Security Policy (CSP) headers to restrict redirect destinations.

🔍 How to Verify

Check if Vulnerable:

Check if your application uses go-chi/chi version 5.2.2 or later and has the RedirectSlashes middleware enabled in code.

Check Version:

grep 'github.com/go-chi/chi/v5' go.mod

Verify Fix Applied:

After updating, verify the version in go.mod is 5.2.3 or later and test that crafted redirect URLs no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in access logs, especially with external domain parameters.

Network Indicators:

  • HTTP 301/302 redirects from your domain to unexpected external domains.

SIEM Query:

http.status_code IN (301, 302) AND url.path CONTAINS "/?redirect=" AND NOT url.domain IN (allowed_domains)

🔗 References

📤 Share & Export