Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47065 | An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft. |
Thu, 17 Jul 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pribai
Pribai privategpt |
|
| CPEs | cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Pribai
Pribai privategpt |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:25:03.038Z
Reserved: 2024-06-12T20:23:55.084Z
Link: CVE-2024-5936
Updated: 2024-08-01T21:25:03.038Z
Status : Analyzed
Published: 2024-06-27T19:15:18.317
Modified: 2025-07-17T01:43:16.010
Link: CVE-2024-5936
No data.
OpenCVE Enrichment
No data.
EUVD