We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54066

DiracX-Web login page has Open Redirect vulnerability



Description

DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability.

Reserved 2025-07-16 | Published 2025-07-17 | Updated 2025-07-17 | Assigner GitHub_M


MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

Problem types

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 0.1.0-a8
affected

References

github.com/...cx-web/security/advisories/GHSA-hfj7-542q-8fvv

github.com/...ommit/eba3b7bc4f9d394074215986e6d3c15b546b25d5

diracx-cert.app.cern.ch/...ps://diracx-cert-app.cern.ch/auth

cve.org (CVE-2025-54066)

nvd.nist.gov (CVE-2025-54066)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54066

Support options

Helpdesk Chat, Email, Knowledgebase