{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T14:32:33.637","vulnerabilities":[{"cve":{"id":"CVE-2025-5256","sourceIdentifier":"security@mautic.org","published":"2025-05-28T18:15:34.723","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SummaryThis advisory addresses an Open Redirection vulnerability in Mautic's user unlocking endpoint. This vulnerability could be exploited by an attacker to redirect legitimate users to malicious websites, potentially leading to phishing attacks or the delivery of exploit kits.\n\nOpen Redirection via returnUrl Parameter: An Open Redirection vulnerability exists in the /s/action/unlock/user.user/0 endpoint. The returnUrl parameter, intended for post-action redirection, is not properly validated. This allows an attacker to craft a URL that, when clicked by a user, redirects them to an arbitrary external website controlled by the attacker.\n\nMitigationUpdate Mautic to a version that properly validates or sanitizes the returnUrl parameter to ensure that redirects only occur to trusted, internal URLs or explicitly whitelisted domains."},{"lang":"es","value":"Resumen: Este aviso aborda una vulnerabilidad de redirección abierta en el endpoint de desbloqueo de usuarios de Mautic. Un atacante podría aprovechar esta vulnerabilidad para redirigir a usuarios legítimos a sitios web maliciosos, lo que podría provocar ataques de phishing o la entrega de kits de explotación. Redirección abierta mediante el parámetro returnUrl: Existe una vulnerabilidad de redirección abierta en el endpoint /s/action/unlock/user.user/0. El parámetro returnUrl, destinado a la redirección posterior a la acción, no está validado correctamente. Esto permite a un atacante manipular una URL que, al hacer clic en ella, redirige a un sitio web externo arbitrario controlado por el atacante. Mitigación: Actualice Mautic a una versión que valide o depure correctamente el parámetro returnUrl para garantizar que las redirecciones solo se realicen a URL internas de confianza o a dominios explícitamente incluidos en la lista blanca."}],"metrics":{"cvssMetricV31":[{"source":"security@mautic.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security@mautic.org","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"references":[{"url":"https://github.com/mautic/mautic/security/advisories/GHSA-6vx9-9r2g-8373","source":"security@mautic.org"}]}}]}