Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5923-r76v-mprm | Open Redirect Vulnerability in Taguette |
Tue, 16 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:taguette:taguette:*:*:*:*:*:*:*:* |
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Taguette
Taguette taguette |
|
| Vendors & Products |
Taguette
Taguette taguette |
Wed, 10 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Taguette is an open source qualitative research tool. In versions 1.5.1 and below, attackers can craft malicious URLs that redirect users to arbitrary external websites after authentication. The application accepts a user-controlled next parameter and uses it directly in HTTP redirects without any validation. This can be exploited for phishing attacks where victims believe they are interacting with a trusted Taguette instance but are redirected to a malicious site designed to steal credentials or deliver malware. This issue is fixed in version 1.5.2. | |
| Title | Taguette does not safeguard against Open Redirect | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-10T15:38:54.717Z
Reserved: 2025-12-08T21:19:11.206Z
Link: CVE-2025-67502
Updated: 2025-12-10T15:38:51.656Z
Status : Analyzed
Published: 2025-12-10T00:16:11.600
Modified: 2025-12-16T15:11:43.103
Link: CVE-2025-67502
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:48:53Z
Github GHSA