We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-40846

HaloITSM open redirect via the returnUrl



Description

Improper Input Validation, the returnUrl parameter in Account Security Settings lacks proper input validation, allowing attackers to redirect users to malicious websites (Open Redirect) and inject JavaScript code to perform cross site scripting attack. The vulnerability affects Halo versions up to 2.174.101 and all versions between 2.175.1 and 2.184.21

Reserved 2025-04-16 | Published 2025-05-08 | Updated 2025-05-08 | Assigner NCSC.ch


HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/RE:L/U:Red

Problem types

CWE-20 Improper Input Validation

CWE-601 URL Redirection to Untrusted Site ('Open Redirect')

Product status

Default status
unaffected

>= 2.174.101
unaffected

>= 2.184.21
unaffected

References

support.haloservicedesk.com/kb?id=2501 vendor-advisory

cve.org (CVE-2025-40846)

nvd.nist.gov (CVE-2025-40846)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-40846

Support options

Helpdesk Chat, Email, Knowledgebase