{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0431","assignerOrgId":"d83a79dd-e128-4b83-8b64-84faf54eed46","state":"PUBLISHED","assignerShortName":"Proofpoint","dateReserved":"2025-01-13T19:25:35.786Z","datePublished":"2025-03-19T16:18:23.793Z","dateUpdated":"2025-03-19T17:38:26.546Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Enterprise Protection","vendor":"Proofpoint","versions":[{"changes":[{"at":"patch 5113","status":"unaffected"}],"lessThan":"patch 5113","status":"affected","version":"8.18.6","versionType":"semver"},{"changes":[{"at":"patch 5114","status":"unaffected"}],"lessThan":"patch 5114","status":"affected","version":"8.20.6","versionType":"semver"},{"changes":[{"at":"patch 5115","status":"unaffected"}],"lessThan":"patch 5115","status":"affected","version":"8.21.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an email which bypasses URL protections impacting the integrity of recipient's email.  This occurs due to improper filtering of backslashes within URLs and affects all versions of 8.21, 8.20 and 8.18 prior to 8.21.0 patch 5115, 8.20.6 patch 5114 and 8.18.6 patch 5113 respectively."}],"value":"Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an email which bypasses URL protections impacting the integrity of recipient's email.  This occurs due to improper filtering of backslashes within URLs and affects all versions of 8.21, 8.20 and 8.18 prior to 8.21.0 patch 5115, 8.20.6 patch 5114 and 8.18.6 patch 5113 respectively."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-790","description":"CWE-790 Improper Filtering of Special Elements","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"d83a79dd-e128-4b83-8b64-84faf54eed46","shortName":"Proofpoint","dateUpdated":"2025-03-19T16:18:23.793Z"},"references":[{"url":"https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2025-0001"}],"source":{"discovery":"UNKNOWN"},"title":"Enterprise Protection Backslash URL Rewrite Bypass","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-19T17:37:58.453989Z","id":"CVE-2025-0431","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-19T17:38:26.546Z"}}]}}