Description
An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/eef9513d-ccc3-4030-b574-374c5e7b887e
Scores
CVSS v3
6.1
EPSS
0.0023
EPSS Percentile
45.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-601
Status
published
Products (1)
pyload/pyload
0.5.0
Published
Nov 15, 2024
Tracked Since
Feb 18, 2026