CVE-2026-2709
Awaiting Analysis Awaiting Analysis - Queue
Open Redirect Vulnerability in Busy 2.5.5 Callback Handler

Publication date: 2026-02-19

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in busy up to 2.5.5. The affected element is an unknown function of the file source-code/busy-master/src/server/app.js of the component Callback Handler. Executing a manipulation of the argument state can lead to open redirect. It is possible to launch the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
busyorg busy to 2.5.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw found in the busy software up to version 2.5.5, specifically in an unknown function within the Callback Handler component located in the file source-code/busy-master/src/server/app.js.

The issue arises when an attacker manipulates the argument 'state', which can lead to an open redirect vulnerability. This means that the application can be tricked into redirecting users to malicious external sites.

The attack can be launched remotely, and an exploit has already been published and may be used by attackers.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to redirect users of the affected application to malicious websites without their consent.

This can lead to phishing attacks, where users might be tricked into providing sensitive information or downloading malware.

Since the exploit can be launched remotely, it increases the risk of widespread abuse if the vulnerable version of busy is in use.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart