Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1007 | Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express performs a redirect using a user-provided URL Express performs an encode [using `encodeurl`](https://github.com/pillarjs/encodeurl) on the contents before passing it to the `location` header. This can cause malformed URLs to be evaluated in unexpected ways by common redirect allow list implementations in Express applications, leading to an Open Redirect via bypass of a properly implemented allow list. The main method impacted is `res.location()` but this is also called from within `res.redirect()`. The vulnerability is fixed in 4.19.2 and 5.0.0-beta.3. |
Github GHSA |
GHSA-rv95-896h-c2vc | Express.js Open Redirect in malformed URLs |
Ubuntu USN |
USN-7581-1 | Express vulnerabilities |
Thu, 18 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs |
Mon, 15 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openjsf
Openjsf express |
|
| CPEs | cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha1:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha2:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha3:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha4:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha5:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha6:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha7:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:alpha8:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:beta1:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:beta2:*:*:*:node.js:*:* cpe:2.3:a:openjsf:express:5.0.0:beta3:*:*:*:node.js:*:* |
|
| Vendors & Products |
Openjsf
Openjsf express |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 06 Jun 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.15::el9 cpe:/a:redhat:openshift_data_foundation:4.16::el9 |
Thu, 22 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.17::el9 |
Tue, 06 May 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.18::el9 |
Fri, 25 Apr 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Pipelines
|
|
| CPEs | cpe:/a:redhat:openshift_pipelines:1.16::el8 | |
| Vendors & Products |
Redhat openshift Pipelines
|
Fri, 04 Oct 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Data Foundation
|
|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.14::el9 | |
| Vendors & Products |
Redhat openshift Data Foundation
|
Thu, 26 Sep 2024 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhmt
|
|
| CPEs | cpe:/a:redhat:rhmt:1.8::el8 | |
| Vendors & Products |
Redhat rhmt
|
Fri, 06 Sep 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat service Mesh
|
|
| CPEs | cpe:/a:redhat:service_mesh:2.6::el8 cpe:/a:redhat:service_mesh:2.6::el9 |
|
| Vendors & Products |
Redhat service Mesh
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:03:51.705Z
Reserved: 2024-03-14T16:59:47.614Z
Link: CVE-2024-29041
Updated: 2024-05-23T19:01:19.506Z
Status : Analyzed
Published: 2024-03-25T21:15:46.847
Modified: 2025-12-18T15:00:42.427
Link: CVE-2024-29041
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN