A vulnerability, which was classified as problematic, was found in thinkgem JeeSite up to 5.12.0. Affected is the function select of the file src/main/java/com/jeesite/modules/cms/web/SiteController.java of the component Site Controller. The manipulation of the argument redirect leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 3d06b8d009d0267f0255acc87ea19d29d07cedc3. It is recommended to apply a patch to fix this issue.
Cite this page
CVE-2025-7763. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-7763
Use CWE-601, Jeesite vendor hub and Jeesite product page to widen CVE-2025-7763 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-8112, CVE-2023-38991 and CVE-2025-5186 for nearby disclosures in the same product family.