Home

Description

Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirect and router.push. An attacker can craft a malicious link that, when opened by an authenticated user, performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. This vulnerability is fixed in 1.57.0.

PUBLISHED Reserved 2026-03-20 | Published 2026-04-06 | Updated 2026-04-06 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L

Problem types

CWE-87: Improper Neutralization of Alternate XSS Syntax

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 1.57.0
affected

References

github.com/...homarr/security/advisories/GHSA-79pg-554g-rw82 exploit

github.com/...homarr/security/advisories/GHSA-79pg-554g-rw82

cve.org (CVE-2026-33510)

nvd.nist.gov (CVE-2026-33510)

Download JSON