Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wqv2-4wpg-8hc9 | Miniflux has an Open Redirect via protocol-relative redirect_url |
Mon, 02 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:miniflux_project:miniflux:*:*:*:*:*:go:*:* | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Miniflux Project
Miniflux Project miniflux |
|
| Vendors & Products |
Miniflux Project
Miniflux Project miniflux |
Thu, 11 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Miniflux 2 is an open source feed reader. Versions 2.2.14 and below treat redirect_url as safe when url.Parse(...).IsAbs() is false, enabling phishing flows after login. Protocol-relative URLs like //ikotaslabs.com have an empty scheme and pass that check, allowing post-login redirects to attacker-controlled sites. This issue is fixed in version 2.2.15. | |
| Title | Miniflux 2 has an Open Redirect via protocol-relative `redirect_url` | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-11T18:52:30.866Z
Reserved: 2025-12-10T17:47:36.417Z
Link: CVE-2025-67713
Updated: 2025-12-11T18:52:26.947Z
Status : Analyzed
Published: 2025-12-11T01:16:00.277
Modified: 2026-02-02T15:05:56.917
Link: CVE-2025-67713
No data.
OpenCVE Enrichment
Updated: 2025-12-11T21:37:57Z
Github GHSA