### [CVE-2024-25566](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25566) ![](https://img.shields.io/static/v1?label=Product&message=PingAM&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.5.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brightgreen) ### Description An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds