Flarum is open source discussion platform software. Prior to version 1.8.5, the Flarum `/logout` route includes a redirect parameter that allows any third party to redirect users from a (trusted) domain of the Flarum installation to redirect to any link. For logged-in users, the logout must be confirmed. Guests are immediately redirected. This could be used by spammers to redirect to a web address using a trusted domain of a running Flarum installation. The vulnerability has been fixed and published as flarum/core v1.8.5. As a workaround, some extensions modifying the logout route can remedy this issue if their implementation is safe.
References
Configurations
History
17 Jan 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
Information
Published : 2024-01-05 21:15
Updated : 2025-01-17 19:15
NVD link : CVE-2024-21641
Mitre link : CVE-2024-21641
CVE.ORG link : CVE-2024-21641
JSON object : View
Products Affected
flarum
- flarum
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')