Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w832-gg5g-x44m | Open redirect endpoint in Datasette |
Fri, 26 Dec 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 26 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV4_0
|
Thu, 13 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Datasette
Datasette datasette |
|
| Vendors & Products |
Datasette
Datasette datasette |
Fri, 07 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Datasette is an open source multi-tool for exploring and publishing data. In versions 0.65.1 and below and 1.0a0 through 1.0a19, deployed instances of Datasette include an open redirect vulnerability. Hits to the path //example.com/foo/bar/ (the trailing slash is required) will redirect the user to https://example.com/foo/bar. This problem has been patched in both Datasette 0.65.2 and 1.0a21. To workaround this issue, if Datasette is running behind a proxy, that proxy could be configured to replace // with / in incoming request URLs. | |
| Title | Open redirect endpoint in Datasette | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-26T21:51:26.384Z
Reserved: 2025-11-05T19:12:25.101Z
Link: CVE-2025-64481
Updated: 2025-11-13T14:23:12.579Z
Status : Deferred
Published: 2025-11-07T21:15:42.010
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-64481
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:33:43Z
Github GHSA