An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
References
Link | Resource |
---|---|
https://huntr.com/bounties/43f05c1e-d7b8-45e2-b1fe-48faf1e3a48d | Exploit Third Party Advisory |
https://huntr.com/bounties/43f05c1e-d7b8-45e2-b1fe-48faf1e3a48d | Exploit Third Party Advisory |
Configurations
History
17 Jul 2025, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/43f05c1e-d7b8-45e2-b1fe-48faf1e3a48d - Exploit, Third Party Advisory | |
First Time |
Pribai
Pribai privategpt |
|
CPE | cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
Information
Published : 2024-06-27 19:15
Updated : 2025-07-17 01:43
NVD link : CVE-2024-5936
Mitre link : CVE-2024-5936
CVE.ORG link : CVE-2024-5936
JSON object : View
Products Affected
pribai
- privategpt
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')