Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 07 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 06 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Red Hat Single Sign-On. This issue is an Open Redirect vulnerability that occurs during the logout process. The redirect_uri parameter associated with the openid-connect logout protocol does not properly validate the provided URL. | |
| Title | Rhsso: open redirect | |
| First Time appeared |
Redhat
Redhat red Hat Single Sign On |
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:/a:redhat:red_hat_single_sign_on:7 | |
| Vendors & Products |
Redhat
Redhat red Hat Single Sign On |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-07T17:59:33.792Z
Reserved: 2025-11-06T02:26:31.270Z
Link: CVE-2025-12789
Updated: 2025-11-07T17:59:28.421Z
Status : Awaiting Analysis
Published: 2025-11-07T00:15:53.117
Modified: 2025-11-12T16:20:22.257
Link: CVE-2025-12789
OpenCVE Enrichment
No data.