Skip to content

Commit 228e195

Browse files
authored
Merge pull request #580 from AikidoSec/new-vuln-open-redirect-govuk
New vuln: Open Redirect in govuk-prototype-kit
2 parents fa11e62 + 5927ce4 commit 228e195

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
{
2+
"package_name": "govuk-prototype-kit",
3+
"patch_versions": [
4+
"13.17.0"
5+
],
6+
"vulnerable_ranges": [
7+
[
8+
"13.1.0",
9+
"13.16.2"
10+
]
11+
],
12+
"cwe": [
13+
"CWE-601"
14+
],
15+
"tldr": "Affected versions of this package are vulnerable to Open Redirect due to improper sanitization of the `returnURL` query parameter in the login functionality. The vulnerability allows attackers to craft malicious links that redirect authenticated users to arbitrary external domains after login, as demonstrated by accessing a URL like `https://myapp.com/manage-prototype/password?returnURL=%2F%2Fevil.com`. Exploitation occurs when a victim logs in via such a manipulated link, enabling phishing attacks where the attacker can steal credentials or distribute malware by redirecting users to a malicious site under their control.",
16+
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
17+
"how_to_fix": "Upgrade the `govuk-prototype-kit` library to the patch version.",
18+
"vulnerable_to": "Open Redirect",
19+
"related_cve_id": "",
20+
"language": "js",
21+
"severity_class": "MEDIUM",
22+
"aikido_score": 52,
23+
"changelog": "https://github.com/alphagov/govuk-prototype-kit/releases/tag/v13.17.0",
24+
"last_modified": "2025-07-01",
25+
"published": "2025-07-01"
26+
}

0 commit comments

Comments
 (0)