We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-0431

Enterprise Protection Backslash URL Rewrite Bypass



Description

Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an email which bypasses URL protections impacting the integrity of recipient's email. This occurs due to improper filtering of backslashes within URLs and affects all versions of 8.21, 8.20 and 8.18 prior to 8.21.0 patch 5115, 8.20.6 patch 5114 and 8.18.6 patch 5113 respectively.

Reserved 2025-01-13 | Published 2025-03-19 | Updated 2025-03-19 | Assigner Proofpoint


MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

Problem types

CWE-790 Improper Filtering of Special Elements

Product status

Default status
affected

8.18.6 before patch 5113
affected

8.20.6 before patch 5114
affected

8.21.0 before patch 5115
affected

References

www.proofpoint.com/.../security-advisories/pfpt-sa-2025-0001

cve.org (CVE-2025-0431)

nvd.nist.gov (CVE-2025-0431)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-0431

Support options

Helpdesk Chat, Email, Knowledgebase
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011