Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31072 | lobe-chat has an Open Redirect |
Github GHSA |
GHSA-xph5-278p-26qx | lobe-chat has an Open Redirect |
Wed, 08 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:* |
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lobehub
Lobehub lobe Chat |
|
| Vendors & Products |
Lobehub
Lobehub lobe Chat |
Thu, 25 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 25 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.130.1, the project's OIDC redirect handling logic constructs the host and protocol of the final redirect URL based on the X-Forwarded-Host or Host headers and the X-Forwarded-Proto value. In deployments where a reverse proxy forwards client-supplied X-Forwarded-* headers to the origin as-is, or where the origin trusts them without validation, an attacker can inject an arbitrary host and trigger an open redirect that sends users to a malicious domain. This issue has been patched in version 1.130.1. | |
| Title | lobe-chat has an Open Redirect | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-25T14:18:27.175Z
Reserved: 2025-09-15T19:13:16.905Z
Link: CVE-2025-59426
Updated: 2025-09-25T14:18:20.239Z
Status : Analyzed
Published: 2025-09-25T14:15:45.930
Modified: 2025-10-08T16:11:34.600
Link: CVE-2025-59426
No data.
OpenCVE Enrichment
Updated: 2025-09-26T11:35:50Z
EUVD
Github GHSA