Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-15450 | Flask-AppBuilder open redirect vulnerability using HTTP host injection |
Github GHSA |
GHSA-99pm-ch96-ccp2 | Flask-AppBuilder open redirect vulnerability using HTTP host injection |
Fri, 19 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:dpgaspar:flask-appbuilder:*:*:*:*:*:*:*:* |
Fri, 16 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 May 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 4.6.2 would allow for a malicious unauthenticated actor to perform an open redirect by manipulating the Host header in HTTP requests. Flask-AppBuilder 4.6.2 introduced the `FAB_SAFE_REDIRECT_HOSTS` configuration variable, which allows administrators to explicitly define which domains are considered safe for redirection. As a workaround, use a reverse proxy to enforce trusted host headers. | |
| Title | Flask-AppBuilder open redirect vulnerability using HTTP host injection | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-16T14:53:52.917Z
Reserved: 2025-04-14T21:47:11.453Z
Link: CVE-2025-32962
Updated: 2025-05-16T14:53:47.737Z
Status : Analyzed
Published: 2025-05-16T14:15:31.190
Modified: 2025-09-19T18:04:24.427
Link: CVE-2025-32962
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:42Z
EUVD
Github GHSA