CVE-2026-42259
Deferred Deferred - Pending Action
Open Redirect in Saltcorn Application

Publication date: 2026-05-07

Last updated on: 2026-05-08

Assigner: GitHub, Inc.

Description
Saltcorn is an extensible, open source, no-code database application builder. Prior to versions 1.4.6, 1.5.6, and 1.6.0-beta.5, Saltcorn validates the post-login dest parameter with a string check that only blocks :/ and //. Because all WHATWG-compliant browsers normalise backslashes (\) to forward slashes (/) for special schemes, a payload such as /\evil.com/path slips through is_relative_url(), is emitted unchanged in the HTTP Location header, and causes the browser to navigate cross-origin to an attacker-controlled domain. The bug is reachable on a default install and only requires a victim who can be tricked into logging in via a crafted Saltcorn URL. This issue has been patched in versions 1.4.6, 1.5.6, and 1.6.0-beta.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
saltcorn saltcorn to 1.6.0-beta.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-42259 is an open redirect vulnerability in Saltcorn, an open source no-code database application builder. The issue arises because Saltcorn's validation of the post-login destination URL (the 'dest' parameter) is incomplete. It only blocks certain patterns like ':/ ' and '//' but fails to block backslashes ('\'). Since modern browsers normalize backslashes to forward slashes, an attacker can craft a URL with a backslash that bypasses the check and causes the browser to redirect to an attacker-controlled domain after login.

This vulnerability can be triggered by tricking a user into logging in via a specially crafted Saltcorn URL. The vulnerable code decodes the destination parameter twice and redirects without properly encoding backslashes, allowing malicious redirects under the guise of a trusted Saltcorn domain.


How can this vulnerability impact me? :

This vulnerability can lead to open redirect attacks where users are redirected to attacker-controlled websites after logging in. Such redirects can be used for credential phishing, where attackers impersonate legitimate sites to steal user credentials or other sensitive information.

Because the redirect appears to come from a trusted Saltcorn domain, users may be more likely to trust the malicious site, increasing the risk of successful phishing or other social engineering attacks.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP responses from Saltcorn servers for suspicious Location headers that contain backslashes (\) or unusual redirect destinations after login attempts.

You can use network traffic inspection tools like curl or tcpdump to capture and analyze HTTP redirects.

  • Use curl to perform a login request with a crafted dest parameter and observe the Location header in the response, for example: curl -v 'https://your-saltcorn-instance/login?dest=/\evil.com/path'
  • Use tcpdump or Wireshark to capture HTTP traffic and filter for HTTP 3xx responses with Location headers containing backslashes or unexpected domains.
  • Check server-side logs for unusual redirect URLs or repeated login attempts with suspicious dest parameters.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Saltcorn to a patched version: 1.4.6, 1.5.6, or 1.6.0-beta.5 or later.

Until you can upgrade, consider implementing additional validation or filtering on the dest parameter to block backslashes and non-http(s) schemes before redirecting.

Educate users to be cautious about clicking on suspicious login URLs that may contain crafted dest parameters.

Monitor for unusual redirect behavior and consider temporarily disabling redirects based on user-supplied parameters if feasible.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Saltcorn allows an attacker to redirect users to malicious domains via crafted URLs after login, potentially enabling credential phishing or other malicious activities under the guise of a trusted domain.

Such unauthorized redirection and potential phishing risks could lead to unauthorized access or disclosure of personal or sensitive data, which may impact compliance with standards and regulations like GDPR or HIPAA that require protection of user data and prevention of phishing attacks.

However, the provided information does not explicitly state the direct impact on compliance with these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart