Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21778 | DiracX-Web is vulnerable to attack through an Open Redirect on its login page |
Github GHSA |
GHSA-hfj7-542q-8fvv | DiracX-Web is vulnerable to attack through an Open Redirect on its login page |
Thu, 17 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 17 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DiracX-Web is a web application that provides an interface to interact with the DiracX services. Prior to version 0.1.0-a8, an attacker can forge a request that they can pass to redirect an authenticated user to another arbitrary website. In the login page, DiracX-Web has a `redirect` field which is the location where the server will redirect the user. This URI is not verified, and can be an arbitrary URI. Paired with a parameter pollution, an attacker can hide their malicious URI. This could be used for phishing, and extract new data (such as redirecting to a new "log in" page, and asking another time credentials). Version 0.1.0-a8 fixes this vulnerability. | |
| Title | DiracX-Web login page has Open Redirect vulnerability | |
| Weaknesses | CWE-601 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-17T20:03:49.445Z
Reserved: 2025-07-16T13:22:18.204Z
Link: CVE-2025-54066
Updated: 2025-07-17T20:03:26.949Z
Status : Deferred
Published: 2025-07-17T15:15:27.873
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-54066
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA