CVE-2025-54066
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-17

Last updated on: 2025-07-17

Assigner: GitHub, Inc.

Description
DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-17
Last Modified
2025-07-17
Generated
2026-05-07
AI Q&A
2025-07-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dirac-grid diracx-web *
dirac-grid diracx-web-components 0.1.0-a7
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in DiracX-Web allows an attacker to forge a request that redirects an authenticated user to an arbitrary website. The login page has a 'redirect' field that specifies where the server will send the user after login, but this URI is not verified and can be manipulated. Using parameter pollution, an attacker can hide their malicious URI, potentially leading users to phishing sites or fake login pages to steal credentials. This issue was fixed in version 0.1.0-a8.


How can this vulnerability impact me? :

This vulnerability can be exploited to redirect authenticated users to malicious websites controlled by attackers. This can lead to phishing attacks where users are tricked into providing sensitive information such as login credentials. It can compromise user trust and potentially lead to unauthorized access if credentials are stolen.


What immediate steps should I take to mitigate this vulnerability?

Upgrade DiracX-Web to version 0.1.0-a8 or later, as this version fixes the vulnerability related to unverified redirect URIs. Additionally, avoid using the vulnerable versions prior to 0.1.0-a8 to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart