Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-20400

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-17 Jul, 2024 | 16:29
Updated At-01 Aug, 2024 | 21:59
Rejected At-
Credits

A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page. Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:17 Jul, 2024 | 16:29
Updated At:01 Aug, 2024 | 21:59
Rejected At:
▼CVE Numbering Authority (CNA)

A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page. Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco TelePresence Video Communication Server (VCS) Expressway
Versions
Affected
  • X8.5.1
  • X8.5.3
  • X8.5
  • X8.6.1
  • X8.6
  • X8.1.1
  • X8.1.2
  • X8.1
  • X8.2.1
  • X8.2.2
  • X8.2
  • X8.7.1
  • X8.7.2
  • X8.7.3
  • X8.7
  • X8.8.1
  • X8.8.2
  • X8.8.3
  • X8.8
  • X8.9.1
  • X8.9.2
  • X8.9
  • X8.10.0
  • X8.10.1
  • X8.10.2
  • X8.10.3
  • X8.10.4
  • X12.5.8
  • X12.5.9
  • X12.5.0
  • X12.5.2
  • X12.5.7
  • X12.5.3
  • X12.5.4
  • X12.5.5
  • X12.5.1
  • X12.5.6
  • X12.6.0
  • X12.6.1
  • X12.6.2
  • X12.6.3
  • X12.6.4
  • X12.7.0
  • X12.7.1
  • X8.11.1
  • X8.11.2
  • X8.11.4
  • X8.11.3
  • X8.11.0
  • X14.0.1
  • X14.0.3
  • X14.0.2
  • X14.0.4
  • X14.0.5
  • X14.0.6
  • X14.0.7
  • X14.0.8
  • X14.0.9
  • X14.0.10
  • X14.0.11
  • X14.2.1
  • X14.2.2
  • X14.2.5
  • X14.2.6
  • X14.2.0
  • X14.2.7
  • X14.3.0
  • X14.3.1
  • X14.3.2
  • X14.3.3
  • X14.3.4
  • X14.3.5
  • X15.0.0
  • X15.0.1
Problem Types
TypeCWE IDDescription
cweCWE-601URL Redirection to Untrusted Site ('Open Redirect')
Type: cwe
CWE ID: CWE-601
Description: URL Redirection to Untrusted Site ('Open Redirect')
Metrics
VersionBase scoreBase severityVector
3.14.7MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
x_transferred
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:17 Jul, 2024 | 17:15
Updated At:31 Jul, 2025 | 16:40

A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by intercepting and modifying an HTTP request from a user. A successful exploit could allow the attacker to redirect the user to a malicious web page. Note: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.7MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.1.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.1.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.1.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.2.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.2.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.2.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.5
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.5.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.5.3
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.5.3:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.6
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.6:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.6.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.6.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.7
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.7.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.7.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.7.3
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.7.3:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.8
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.8.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.8.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.8.3
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.8.3:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.9
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.9.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.9.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.9.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.10.0
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.0:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.10.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.10.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.10.3
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.3:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.10.4
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.10.4:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.11.0
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.0:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.11.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.11.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.11.3
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.3:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x8.11.4
cpe:2.3:a:cisco:telepresence_video_communication_server:x8.11.4:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.0
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.0:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.3
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.3:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.4
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.4:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.5
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.5:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.6
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.6:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.7
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.7:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.8
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.8:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.5.9
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.5.9:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.6.0
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.0:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.6.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.6.2
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.2:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.6.3
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.3:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.6.4
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.6.4:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.7.0
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.7.0:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x12.7.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x12.7.1:*:*:*:expressway:*:*:*
Cisco Systems, Inc.
cisco
>>telepresence_video_communication_server>>x14.0.1
cpe:2.3:a:cisco:telepresence_video_communication_server:x14.0.1:*:*:*:expressway:*:*:*
Weaknesses
CWE IDTypeSource
CWE-601Secondarypsirt@cisco.com
CWE ID: CWE-601
Type: Secondary
Source: psirt@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgjpsirt@cisco.com
Vendor Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgjaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-redirect-KJsFuXgj
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

64Records found

CVE-2025-53821
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.04% / 11.96%
||
7 Day CHG+0.01%
Published-14 Jul, 2025 | 22:16
Updated-18 Jul, 2025 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WeGIA vulnerable to Open Redirect in endpoint 'control.php' parameter 'nextPage'

WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. An Open Redirect vulnerability exists in the web application prior to version 3.4.5. The control.php endpoint allows to specify an arbitrary URL via the `nextPage` parameter, leading to an uncontrolled redirection. Version 3.4.5 contains a fix for the issue.

Action-Not Available
Vendor-wegiaLabRedesCefetRJ
Product-wegiaWeGIA
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2022-0283
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.10% / 29.24%
||
7 Day CHG~0.00%
Published-28 Mar, 2022 | 18:53
Updated-02 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered affecting GitLab versions prior to 13.5. An open redirect vulnerability was fixed in GitLab integration with Jira that a could cause the web application to redirect the request to the attacker specified URL.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-5183
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.03% / 7.71%
||
7 Day CHG~0.00%
Published-26 May, 2025 | 11:31
Updated-03 Jun, 2025 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Summer Pearl Group Vacation Rental Management Platform Header redirect

A vulnerability was found in Summer Pearl Group Vacation Rental Management Platform up to 1.0.1 and classified as problematic. This issue affects some unknown processing of the component Header Handler. The manipulation of the argument Host leads to open redirect. The attack may be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. It is recommended to upgrade the affected component.

Action-Not Available
Vendor-summerpearlgroupSummer Pearl Group
Product-vacation_rental_management_platformVacation Rental Management Platform
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2021-39191
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.37% / 58.11%
||
7 Day CHG-0.01%
Published-03 Sep, 2021 | 00:00
Updated-04 Aug, 2024 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
URL Redirection to Untrusted Site ('Open Redirect') in mod_auth_openidc

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of mod_auth_openidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the `target_link_uri` parameter. A patch in version 2.4.9.4 made it so that the `OIDCRedirectURLsAllowed` setting must be applied to the `target_link_uri` parameter. There are no known workarounds aside from upgrading to a patched version.

Action-Not Available
Vendor-openidczmartzoneDebian GNU/LinuxFedora Project
Product-mod_auth_openidcdebian_linuxfedoramod_auth_openidc
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-4296
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 7.77%
||
7 Day CHG~0.00%
Published-23 Jul, 2025 | 11:21
Updated-23 Jul, 2025 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Redirect in HotelRunner's B2B

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HotelRunner B2B allows Forceful Browsing.This issue affects B2B: before 04.06.2025.

Action-Not Available
Vendor-HotelRunner
Product-B2B
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2012-0518
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-4.7||MEDIUM
EPSS-24.10% / 95.84%
||
7 Day CHG~0.00%
Published-16 Oct, 2012 | 23:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-18||Apply updates per vendor instructions.

Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a different vulnerability than CVE-2012-3175.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/aFusion Middleware
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2022-43950
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-3.9||LOW
EPSS-0.15% / 36.60%
||
7 Day CHG~0.00%
Published-03 May, 2023 | 21:26
Updated-22 Oct, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A URL redirection to untrusted site ('Open Redirect') vulnerability [CWE-601] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.1 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an unauthenticated attacker to redirect users to any arbitrary website via a crafted URL.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortinacfortinac-fFortiNAC
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2021-32786
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.12% / 31.17%
||
7 Day CHG~0.00%
Published-22 Jul, 2021 | 00:00
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Redirect in oidc_validate_redirect_url()

mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9, `oidc_validate_redirect_url()` does not parse URLs the same way as most browsers do. As a result, this function can be bypassed and leads to an Open Redirect vulnerability in the logout functionality. This bug has been fixed in version 2.4.9 by replacing any backslash of the URL to redirect with slashes to address a particular breaking change between the different specifications (RFC2396 / RFC3986 and WHATWG). As a workaround, this vulnerability can be mitigated by configuring `mod_auth_openidc` to only allow redirection whose destination matches a given regular expression.

Action-Not Available
Vendor-openidczmartzoneThe Apache Software FoundationFedora Project
Product-mod_auth_openidchttp_serverfedoramod_auth_openidc
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-28076
Matching Score-4
Assigner-SolarWinds
ShareView Details
Matching Score-4
Assigner-SolarWinds
CVSS Score-7||HIGH
EPSS-0.03% / 5.70%
||
7 Day CHG~0.00%
Published-18 Apr, 2024 | 09:05
Updated-10 Feb, 2025 | 22:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SolarWinds Platform Arbitrary Open Redirection Vulnerability

The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerability. A potential attacker can redirect to different domain when using URL parameter with relative entry in the correct format

Action-Not Available
Vendor-SolarWindsSolarWinds Worldwide, LLC.
Product-solarwinds_platformSolarWinds Platformsolarwinds_platform
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-25559
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-4.7||MEDIUM
EPSS-0.26% / 48.65%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 04:32
Updated-13 May, 2025 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8. If an attacker sends a specially crafted request, the administrator of the product may be forced to access an arbitrary website when clicking a link in the audit log.

Action-Not Available
Vendor-applepleappleple inc.
Product-a-blog_cmsa-blog cms
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-25676
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.14% / 34.04%
||
7 Day CHG~0.00%
Published-01 May, 2024 | 00:00
Updated-30 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ViewerJS 0.5.8. A script from the component loads content via URL TAGs without properly sanitizing it. This leads to both open redirection and out-of-band resource loading.

Action-Not Available
Vendor-n/aviewerjs
Product-n/aviewerjs
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-21641
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-39.80% / 97.22%
||
7 Day CHG~0.00%
Published-05 Jan, 2024 | 21:02
Updated-03 Jun, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flarum's Logout Route allows open redirects

Flarum is open source discussion platform software. Prior to version 1.8.5, the Flarum `/logout` route includes a redirect parameter that allows any third party to redirect users from a (trusted) domain of the Flarum installation to redirect to any link. For logged-in users, the logout must be confirmed. Guests are immediately redirected. This could be used by spammers to redirect to a web address using a trusted domain of a running Flarum installation. The vulnerability has been fixed and published as flarum/core v1.8.5. As a workaround, some extensions modifying the logout route can remedy this issue if their implementation is safe.

Action-Not Available
Vendor-flarumflarum
Product-flarumframework
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-41801
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.11% / 29.34%
||
7 Day CHG~0.00%
Published-25 Jul, 2024 | 16:50
Updated-26 Aug, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenProject packaged installation has Open Redirect Vulnerability in Sign-In in default configuration

OpenProject is open source project management software. Prior to version 14.3.0, using a forged HOST header in the default configuration of packaged installations and using the "Login required" setting, an attacker could redirect to a remote host to initiate a phishing attack against an OpenProject user's account. This vulnerability affects default packaged installation of OpenProject without any additional configuration or modules on Apache (such as mod_security, manually setting a host name, having a fallthrough VirtualHost). It might also affect other installations that did not take care to fix the HOST/X-Forwarded-Host headers. Version 14.3.0 includes stronger protections for the hostname from within the application using the HostAuthorization middleware of Rails to reject any requests with a host name that does not match the configured one. Also, all generated links by the application are now ensured to use the built-in hostname. Users who aren't able to upgrade immediately may use mod_security for Apache2 or manually fix the Host and X-Forwarded-Host headers in their proxying application before reaching the application server of OpenProject. Alternatively, they can manually apply the patch to opt-in to host header protections in previous versions of OpenProject.

Action-Not Available
Vendor-openprojectopf
Product-openprojectopenproject
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-46886
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-5.1||MEDIUM
EPSS-0.07% / 22.73%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 08:40
Updated-08 Jul, 2025 | 10:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web server of affected devices does not properly validate input that is used for a user redirection. This could allow an attacker to make the server redirect the legitimate user to an attacker-chosen URL. For a successful exploit, the legitimate user must actively click on an attacker-crafted link.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC S7-1500 CPU 1518F-4 PN/DPSIPLUS S7-1500 CPU 1511F-1 PNSIMATIC S7-1200 CPU 1212C DC/DC/RlySIMATIC S7-1500 Software Controller CPU 1508S V2SIMATIC S7-1500 CPU 1511T-1 PNSIPLUS S7-1500 CPU 1515R-2 PN TX RAILSIPLUS S7-1500 CPU 1518-4 PN/DPSIMATIC S7-1500 CPU 1515-2 PNSIMATIC S7-1500 Software Controller Linux V3SIMATIC S7-1500 Software Controller CPU 1507S F V2SIPLUS ET 200SP CPU 1512SP F-1 PN RAILSIMATIC S7-1200 CPU 1211C DC/DC/DCSIPLUS ET 200SP CPU 1512SP-1 PNSIMATIC S7-1500 CPU 1513F-1 PNSIMATIC S7-1500 CPU 1515T-2 PNSIMATIC ET 200SP CPU 1514SPT-2 PNSIMATIC S7-1500 Software Controller CPU 1508S V3SIPLUS ET 200SP CPU 1512SP-1 PN RAILSIMATIC ET 200SP CPU 1514SPT F-2 PNSIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PNSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V2 CPUsSIPLUS S7-1200 CPU 1212 AC/DC/RLYSIPLUS S7-1500 CPU 1515F-2 PN T2 RAILSIMATIC S7-PLCSIM AdvancedSIMATIC S7-1500 CPU 1516T-3 PN/DPSIPLUS S7-1500 CPU 1513F-1 PNSIMATIC S7-1500 CPU 1513pro-2 PNSIPLUS S7-1200 CPU 1214 DC/DC/RLYSIMATIC S7-1500 CPU 1517F-3 PN/DPSIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PNSIMATIC ET 200SP CPU 1512SP F-1 PNSIMATIC S7-1500 Software Controller CPU 1508S F V2SIPLUS ET 200SP CPU 1512SP F-1 PNSIMATIC S7-1500 CPU 1516pro-2 PNSIMATIC S7-1200 CPU 1217C DC/DC/DCSIMATIC S7-1500 CPU 1518T-4 PN/DPSIMATIC ET 200SP CPU 1510SP-1 PNSIPLUS S7-1200 CPU 1214 AC/DC/RLYSIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PNSIMATIC S7-1500 CPU 1513-1 PNSIPLUS S7-1500 CPU 1516F-3 PN/DP RAILSIMATIC S7-1500 CPU 1518F-4 PN/DP MFPSIPLUS S7-1500 CPU 1515F-2 PN RAILSIMATIC S7-1500 CPU 1513pro F-2 PNSIPLUS S7-1500 CPU 1516-3 PN/DPSIPLUS S7-1500 CPU 1516F-3 PN/DPSIMATIC ET 200SP CPU 1514SP-2 PNSIMATIC Drive Controller CPU 1507D TFSIMATIC S7-1500 CPU 1516-3 PN/DPSIPLUS S7-1200 CPU 1215 DC/DC/DCSIMATIC S7-1500 CPU 1517TF-3 PN/DPSIMATIC S7-1500 CPU S7-1518-4 PN/DP ODKSIPLUS S7-1500 CPU 1518-4 PN/DP MFPSIMATIC Drive Controller CPU 1504D TFSIPLUS S7-1200 CPU 1212C DC/DC/DCSIPLUS S7-1200 CPU 1215C DC/DC/DCSIPLUS S7-1500 CPU 1511-1 PN TX RAILSIMATIC S7-1500 CPU 1516TF-3 PN/DPSIMATIC S7-1500 Software Controller CPU 1507S V3SIMATIC S7-1500 CPU 1511-1 PNSIMATIC S7-1200 CPU 1215C AC/DC/RlySIPLUS S7-1500 CPU 1516-3 PN/DP RAILSIMATIC S7-1500 Software Controller CPU 1507S F V3SIMATIC S7-1200 CPU 1215C DC/DC/RlySIMATIC S7-1200 CPU 1214C DC/DC/RlySIMATIC ET 200SP CPU 1510SP F-1 PNSIPLUS S7-1200 CPU 1212 DC/DC/RLYSIMATIC S7-1200 CPU 1215FC DC/DC/DCSIMATIC S7-1500 CPU 1511F-1 PNSIMATIC S7-1500 CPU 1518-4 PN/DPSIMATIC S7-1500 Software Controller CPU 1508S TF V3SIMATIC ET 200SP CPU 1514SP F-2 PNSIPLUS S7-1200 CPU 1214 DC/DC/DCSIMATIC S7-1200 CPU 1211C DC/DC/RlySIMATIC ET 200SP CPU 1512SP-1 PNSIMATIC S7-1500 Software Controller Linux V2SIMATIC S7-1200 CPU 1214C AC/DC/RlySIMATIC S7-1200 CPU 1212FC DC/DC/DCSIMATIC S7-1500 CPU 1517T-3 PN/DPSIMATIC S7-1200 CPU 1214FC DC/DC/RlySIPLUS ET 200SP CPU 1510SP-1 PN RAILSIMATIC S7-1200 CPU 1211C AC/DC/RlySIMATIC S7-1500 Software Controller CPU 1508S F V3SIPLUS ET 200SP CPU 1510SP F-1 PNSIPLUS S7-1200 CPU 1214FC DC/DC/DCSIPLUS S7-1200 CPU 1214FC DC/DC/RLYSIMATIC S7-1500 CPU 1515TF-2 PNSIPLUS S7-1200 CPU 1215FC DC/DC/DCSIPLUS S7-1500 CPU 1513-1 PNSIPLUS S7-1200 CPU 1214C DC/DC/DC RAILSIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODKSIPLUS S7-1500 CPU 1511-1 PN T1 RAILSIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PNSIMATIC S7-1500 CPU 1516F-3 PN/DPSIMATIC S7-1200 CPU 1215FC DC/DC/RlySIPLUS ET 200SP CPU 1510SP F-1 PN RAILSIPLUS S7-1500 CPU 1511-1 PNSIMATIC S7-1500 CPU 1515F-2 PNSIMATIC S7-1500 CPU 1511TF-1 PNSIMATIC S7-1500 CPU 1516pro F-2 PNSIMATIC S7-1500 CPU 1518-4 PN/DP MFPSIMATIC S7-1200 CPU 1212C DC/DC/DCSIPLUS S7-1500 CPU 1515F-2 PNSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUsSIMATIC S7-1500 CPU 1511C-1 PNSIPLUS S7-1500 CPU 1518F-4 PN/DPSIPLUS S7-1200 CPU 1215 AC/DC/RLYSIMATIC S7-1200 CPU 1214C DC/DC/DCSIMATIC S7-1200 CPU 1212C AC/DC/RlySIMATIC S7-1200 CPU 1214FC DC/DC/DCSIMATIC S7-1500 CPU 1512C-1 PNSIPLUS S7-1200 CPU 1215 DC/DC/RLYSIPLUS S7-1200 CPU 1212C DC/DC/DC RAILSIMATIC S7-1500 CPU 1518TF-4 PN/DPSIMATIC S7-1500 Software Controller CPU 1507S V2SIMATIC S7-1500 CPU 1517-3 PN/DPSIPLUS S7-1500 CPU 1516-3 PN/DP TX RAILSIMATIC S7-1200 CPU 1212FC DC/DC/RlySIPLUS ET 200SP CPU 1510SP-1 PNSIMATIC S7-1200 CPU 1215C DC/DC/DCSIMATIC S7-1500 Software Controller CPU 1508S T V3
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
  • Previous
  • 1
  • 2
  • Next
Details not found