CVE-2025-54066
BaseFortify
Publication date: 2025-07-17
Last updated on: 2025-07-17
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dirac-grid | diracx-web | * |
| dirac-grid | diracx-web-components | 0.1.0-a7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in DiracX-Web allows an attacker to forge a request that redirects an authenticated user to an arbitrary website. The login page has a 'redirect' field that specifies where the server will send the user after login, but this URI is not verified and can be manipulated. Using parameter pollution, an attacker can hide their malicious URI, potentially leading users to phishing sites or fake login pages to steal credentials. This issue was fixed in version 0.1.0-a8.
How can this vulnerability impact me? :
This vulnerability can be exploited to redirect authenticated users to malicious websites controlled by attackers. This can lead to phishing attacks where users are tricked into providing sensitive information such as login credentials. It can compromise user trust and potentially lead to unauthorized access if credentials are stolen.
What immediate steps should I take to mitigate this vulnerability?
Upgrade DiracX-Web to version 0.1.0-a8 or later, as this version fixes the vulnerability related to unverified redirect URIs. Additionally, avoid using the vulnerable versions prior to 0.1.0-a8 to prevent exploitation.