
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-57821 affects Basecamp's Google Sign-In Rails application integration prior to version 1.3.0. The vulnerability was discovered and disclosed on August 27, 2025, impacting applications using this authentication component. The issue allows attackers to craft malformed URLs that bypass the 'same origin' security check, potentially leading to unauthorized redirects (GitHub Advisory).
The vulnerability is classified as CWE-601 (URL Redirection to Untrusted Site) with a CVSS v3.1 score of 4.2 (Medium). The attack vector is Network-based (AV:N) with High attack complexity (AC:H), requiring no privileges (PR:N) but user interaction (UI:R), with unchanged scope (S:U) and low impact on confidentiality (C:L) and integrity (I:L) with no availability impact (A:N) (GitHub Advisory).
The vulnerability primarily affects Rails applications configured to store flash information in session cookies. If successfully exploited, it could lead to users being redirected to malicious sites after authentication, potentially exposing authentication information such as tokens. The impact is particularly significant when combined with attacks that allow injection of arbitrary data into session cookies (GitHub Advisory).
The vulnerability has been patched in version 1.3.0 of the googlesignin gem. For users unable to upgrade immediately, a workaround is available by explicitly setting SameSite=Lax or SameSite=Strict on the application session cookie. This helps mitigate the potential for chained attacks (GitHub Release, GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."