Vulnerabilities (CVE)

Filtered by CWE-601
Total 1137 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-29137 1 Arubanetworks 1 Airwave 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
A remote URL redirection vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has released patches for AirWave Management Platform that address this security vulnerability.
CVE-2021-28861 2 Fedoraproject, Python 2 Fedora, Python 2024-11-21 N/A 7.4 HIGH
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states "Warning: http.server is not recommended for production. It only implements basic security checks."
CVE-2021-28125 1 Apache 1 Superset 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.
CVE-2021-27612 1 Sap 1 Gui For Windows 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
In specific situations SAP GUI for Windows until and including 7.60 PL9, 7.70 PL0, forwards a user to specific malicious website which could contain malware or might lead to phishing attacks to steal credentials of the victim.
CVE-2021-27404 1 Asus 2 Askey Rtf8115vw, Askey Rtf8115vw Firmware 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a Host HTTP header.
CVE-2021-27352 1 Ilch 1 Ilch Cms 2024-11-21 4.9 MEDIUM 5.4 MEDIUM
An open redirect vulnerability in Ilch CMS version 2.1.42 allows attackers to redirect users to an attacker's site after a successful login.
CVE-2021-25757 1 Jetbrains 1 Hub 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
In JetBrains Hub before 2020.1.12629, an open redirect was possible.
CVE-2021-25737 1 Kubernetes 1 Kubernetes 2024-11-21 4.9 MEDIUM 2.7 LOW
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
CVE-2021-25655 1 Avaya 1 Aura Experience Portal 2024-11-21 5.8 MEDIUM 4.4 MEDIUM
A vulnerability in the system Service Menu component of Avaya Aura Experience Portal may allow URL Redirection to any untrusted site through a crafted attack. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix).
CVE-2021-25640 1 Apache 1 Dubbo 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
In Apache Dubbo prior to 2.6.9 and 2.7.9, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.
CVE-2021-25111 1 English Wordpress Admin Project 1 English Wordpress Admin 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The English WordPress Admin WordPress plugin before 1.5.2 does not validate the admin_custom_language_return_url before redirecting users o it, leading to an open redirect issue
CVE-2021-25074 1 Webp Converter For Media Project 1 Webp Converter For Media 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The WebP Converter for Media WordPress plugin before 4.0.3 contains a file (passthru.php) which does not validate the src parameter before redirecting the user to it, leading to an Open Redirect issue
CVE-2021-25033 1 Noptin 1 Noptin 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The WordPress Newsletter Plugin WordPress plugin before 1.6.5 does not validate the to parameter before redirecting the user to its given value, leading to an open redirect issue
CVE-2021-25028 1 Tri 1 Event Tickets 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The Event Tickets WordPress plugin before 5.2.2 does not validate the tribe_tickets_redirect_to parameter before redirecting the user to the given value, leading to an arbitrary redirect issue
CVE-2021-24838 1 Bologer 1 Anycomment 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The AnyComment WordPress plugin before 0.3.5 has an API endpoint which passes user input via the redirect parameter to the wp_redirect() function without being validated first, leading to an Open Redirect issue, which according to the vendor, is a feature.
CVE-2021-24406 1 Gvectors 1 Wpforo Forum 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The wpForo Forum WordPress plugin before 1.9.7 did not validate the redirect_to parameter in the login form of the forum, leading to an open redirect issue after a successful login. Such issue could allow an attacker to induce a user to use a login URL redirecting to a website under their control and being a replica of the legitimate one, asking them to re-enter their credentials (which will then in the attacker hands)
CVE-2021-24358 1 Posimyth 1 The Plus Addons For Elementor 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.10 did not validate a redirect parameter on a specifically crafted URL before redirecting the user to it, leading to an Open Redirect issue.
CVE-2021-24288 1 Acymailing 1 Acymailing 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
When subscribing using AcyMailing, the 'redirect' parameter isn't properly sanitized. Turning the request from POST to GET, an attacker can craft a link containing a potentially malicious landing page and send it to the victim.
CVE-2021-24210 1 Kiboit 1 Phastpress 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.
CVE-2021-24165 1 Ninjaforms 1 Ninja Forms 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
In the Ninja Forms Contact Form WordPress plugin before 3.4.34, the wp_ajax_nf_oauth_connect AJAX action was vulnerable to open redirect due to the use of a user supplied redirect parameter and no protection in place.