Description
An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
Published: 2024-06-27
Score: 6.1 Medium
EPSS: 2.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-47065 An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
History

Thu, 17 Jul 2025 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Pribai
Pribai privategpt
CPEs cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:*
Vendors & Products Pribai
Pribai privategpt
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Pribai Privategpt
cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:25:03.038Z

Reserved: 2024-06-12T20:23:55.084Z

Link: CVE-2024-5936

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.038Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T19:15:18.317

Modified: 2025-07-17T01:43:16.010

Link: CVE-2024-5936

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses