We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32962

Flask-AppBuilder open redirect vulnerability using HTTP host injection



Description

Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 4.6.2 would allow for a malicious unauthenticated actor to perform an open redirect by manipulating the Host header in HTTP requests. Flask-AppBuilder 4.6.2 introduced the `FAB_SAFE_REDIRECT_HOSTS` configuration variable, which allows administrators to explicitly define which domains are considered safe for redirection. As a workaround, use a reverse proxy to enforce trusted host headers.

Reserved 2025-04-14 | Published 2025-05-16 | Updated 2025-05-16 | Assigner GitHub_M


MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

Problem types

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 4.6.2
affected

References

github.com/...uilder/security/advisories/GHSA-99pm-ch96-ccp2

github.com/...ommit/32eedbbb5cb483a3e782c5f2732de4a6a650d9b6

cve.org (CVE-2025-32962)

nvd.nist.gov (CVE-2025-32962)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32962

Support options

Helpdesk Chat, Email, Knowledgebase