We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A client-side security misconfiguration vulnerability exists in OpenBlow whistleblowing platform across multiple versions and default deployments, due to the absence of critical HTTP response headers including Content-Security-Policy, Referrer-Policy, Permissions-Policy, Cross-Origin-Embedder-Policy, and Cross-Origin-Resource-Policy. This omission weakens browser-level defenses and exposes users to cross-site scripting (XSS), clickjacking, and referer leakage. Although some instances attempt to enforce CSP via HTML <meta> tags, this method is ineffective, as modern browsers rely on header-based enforcement to reliably block inline scripts and untrusted resources.
Reserved 2025-04-15 | Published 2025-07-25 | Updated 2025-07-25 | Assigner VulnCheckCWE-749 Exposed Dangerous Method or Function
CWE-94 Improper Control of Generation of Code ('Code Injection')
Tifa Lockhart
seclists.org/fulldisclosure/2025/Jul/13
www.openblow.it
www.vulncheck.com/...nblow-missing-critical-security-headers
Support options