CVE-2026-2709
Open Redirect Vulnerability in Busy 2.5.5 Callback Handler
Publication date: 2026-02-19
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| busyorg | busy | to 2.5.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw found in the busy software up to version 2.5.5, specifically in an unknown function within the Callback Handler component located in the file source-code/busy-master/src/server/app.js.
The issue arises when an attacker manipulates the argument 'state', which can lead to an open redirect vulnerability. This means that the application can be tricked into redirecting users to malicious external sites.
The attack can be launched remotely, and an exploit has already been published and may be used by attackers.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to redirect users of the affected application to malicious websites without their consent.
This can lead to phishing attacks, where users might be tricked into providing sensitive information or downloading malware.
Since the exploit can be launched remotely, it increases the risk of widespread abuse if the vulnerable version of busy is in use.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know