The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-69725

CVE-2025-69725: go-chi/chi Open Redirect Vulnerability

CVE-2025-69725 is an open redirect flaw in go-chi/chi >=5.2.2 RedirectSlashes function that enables attackers to redirect users to malicious sites. This article covers technical details, affected versions, and mitigations.

Published: February 20, 2026

CVE-2025-69725 Overview

An Open Redirect vulnerability exists in the go-chi/chi library versions 5.2.2 and later. The vulnerability is located in the RedirectSlashes function, which allows remote attackers to redirect victim users to malicious websites while leveraging the legitimate website domain. This type of vulnerability is commonly exploited in phishing attacks, where users trust the initial domain but are unknowingly redirected to attacker-controlled sites.

Critical Impact

Attackers can abuse the trusted domain to redirect users to malicious websites, enabling phishing attacks, credential theft, and malware distribution while bypassing user suspicion.

Affected Products

  • go-chi/chi versions >= 5.2.2

Discovery Timeline

  • 2026-02-19 - CVE CVE-2025-69725 published to NVD
  • 2026-02-19 - Last updated in NVD database

Technical Details for CVE-2025-69725

Vulnerability Analysis

This Open Redirect vulnerability stems from improper validation of redirect URLs within the RedirectSlashes middleware function. The RedirectSlashes middleware is commonly used in go-chi/chi web applications to automatically redirect requests that contain trailing slashes to their non-slash equivalents (or vice versa). However, the function fails to properly sanitize or validate the target URL before performing the redirect operation.

When an attacker crafts a malicious URL that exploits this middleware, they can manipulate the redirect destination to point to an external, attacker-controlled domain. Because the initial request goes through the legitimate application's domain, users may not notice they are being redirected to a malicious site. This makes the vulnerability particularly dangerous for phishing campaigns and social engineering attacks.

The network-based attack vector means exploitation can occur remotely without any authentication requirements, though user interaction is required as the victim must click on or visit the malicious link.

Root Cause

The root cause of this vulnerability is insufficient input validation in the RedirectSlashes function. The middleware does not adequately verify that the constructed redirect URL remains within the same domain or follows a safe redirect pattern. This allows attackers to inject external URLs or URL-like paths that, when processed by the middleware, result in redirects to arbitrary external domains.

Attack Vector

The attack is network-based and requires user interaction. An attacker would craft a specially formatted URL that, when visited by a victim user, causes the vulnerable RedirectSlashes middleware to redirect the user to an attacker-controlled website. The malicious URL would appear to be hosted on the legitimate application domain, making it more likely that users would trust and click on the link.

A typical attack scenario involves:

  1. The attacker identifies a web application using the vulnerable go-chi/chi middleware
  2. The attacker crafts a malicious URL that exploits the open redirect vulnerability
  3. The attacker distributes the malicious URL via phishing emails, social media, or other channels
  4. When a victim clicks the link, they are redirected from the trusted domain to a malicious site

The vulnerability mechanism involves URL manipulation that bypasses the expected redirect behavior. For detailed technical information about the exploitation pattern and vulnerable code paths, refer to the GitHub Security Advisory GHSA-mqqf-5wvp-8fh8.

Detection Methods for CVE-2025-69725

Indicators of Compromise

  • Unusual HTTP redirect responses (3xx status codes) from the application that point to external domains
  • Server logs showing requests with manipulated URL paths containing external domain references
  • User reports of being redirected to unexpected or suspicious websites after clicking legitimate-looking links

Detection Strategies

  • Monitor web application logs for redirect responses that contain external URLs or suspicious domain patterns
  • Implement URL validation checks that flag redirects to domains not on an approved allowlist
  • Deploy web application firewalls (WAF) with rules to detect and block common open redirect attack patterns

Monitoring Recommendations

  • Enable verbose logging for the RedirectSlashes middleware to capture all redirect operations and their target URLs
  • Set up alerting for abnormal redirect patterns, particularly those involving external domains
  • Regularly audit application routes and middleware configurations to identify potential exposure points

How to Mitigate CVE-2025-69725

Immediate Actions Required

  • Review all applications using go-chi/chi versions 5.2.2 and later that implement the RedirectSlashes middleware
  • Consider temporarily disabling the RedirectSlashes middleware until a patch is applied
  • Implement URL validation to ensure redirects only target same-origin URLs

Patch Information

Organizations should monitor the go-chi/chi project and the GitHub Security Advisory for official patch releases. Apply vendor-provided security updates as soon as they become available.

Workarounds

  • Implement a custom middleware wrapper that validates redirect URLs before allowing the redirect to proceed
  • Use an allowlist approach that only permits redirects to known, trusted domains within your organization
  • Add input validation to strip or reject URL components that could be used to construct external redirects

To implement URL validation as a workaround, applications should verify that all redirect targets use relative paths or match the application's expected domain before executing the redirect. The GitHub Security Advisory provides additional guidance on implementing safe redirect patterns.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechGo Chi

  • SeverityMEDIUM

  • CVSS Score4.7

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Go-Chi Chi Homepage

  • GitHub Security Advisory GHSA-mqqf-5wvp-8fh8
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English