Skip to content

Commit 5927ce4

Browse files
Move new vulnerability to vulnerabilities/AIKIDO-2025-10426.json and reset new.json template
1 parent 5e9702e commit 5927ce4

File tree

2 files changed

+38
-21
lines changed

2 files changed

+38
-21
lines changed

input/new.json

Lines changed: 12 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,15 @@
11
{
2-
"package_name": "govuk-prototype-kit",
3-
"patch_versions": [
4-
"13.17.0"
5-
],
6-
"vulnerable_ranges": [
7-
[
8-
"13.1.0",
9-
"13.16.2"
10-
]
11-
],
12-
"cwe": [
13-
"CWE-601"
14-
],
15-
"tldr": "Affected versions of this package are vulnerable to Open Redirect due to improper sanitization of the `returnURL` query parameter in the login functionality. The vulnerability allows attackers to craft malicious links that redirect authenticated users to arbitrary external domains after login, as demonstrated by accessing a URL like `https://myapp.com/manage-prototype/password?returnURL=%2F%2Fevil.com`. Exploitation occurs when a victim logs in via such a manipulated link, enabling phishing attacks where the attacker can steal credentials or distribute malware by redirecting users to a malicious site under their control.",
16-
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
17-
"how_to_fix": "Upgrade the `govuk-prototype-kit` library to the patch version.",
18-
"vulnerable_to": "Open Redirect",
2+
"package_name": "",
3+
"patch_versions": [],
4+
"vulnerable_ranges": [],
5+
"cwe": [],
6+
"tldr": "",
7+
"doest_this_affect_me": "",
8+
"how_to_fix": "",
9+
"vulnerable_to": "",
1910
"related_cve_id": "",
20-
"language": "js",
21-
"severity_class": "MEDIUM",
22-
"aikido_score": 52,
23-
"changelog": "https://github.com/alphagov/govuk-prototype-kit/releases/tag/v13.17.0"
11+
"language": "",
12+
"severity_class": "",
13+
"aikido_score": 0,
14+
"changelog": ""
2415
}
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
{
2+
"package_name": "govuk-prototype-kit",
3+
"patch_versions": [
4+
"13.17.0"
5+
],
6+
"vulnerable_ranges": [
7+
[
8+
"13.1.0",
9+
"13.16.2"
10+
]
11+
],
12+
"cwe": [
13+
"CWE-601"
14+
],
15+
"tldr": "Affected versions of this package are vulnerable to Open Redirect due to improper sanitization of the `returnURL` query parameter in the login functionality. The vulnerability allows attackers to craft malicious links that redirect authenticated users to arbitrary external domains after login, as demonstrated by accessing a URL like `https://myapp.com/manage-prototype/password?returnURL=%2F%2Fevil.com`. Exploitation occurs when a victim logs in via such a manipulated link, enabling phishing attacks where the attacker can steal credentials or distribute malware by redirecting users to a malicious site under their control.",
16+
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
17+
"how_to_fix": "Upgrade the `govuk-prototype-kit` library to the patch version.",
18+
"vulnerable_to": "Open Redirect",
19+
"related_cve_id": "",
20+
"language": "js",
21+
"severity_class": "MEDIUM",
22+
"aikido_score": 52,
23+
"changelog": "https://github.com/alphagov/govuk-prototype-kit/releases/tag/v13.17.0",
24+
"last_modified": "2025-07-01",
25+
"published": "2025-07-01"
26+
}

0 commit comments

Comments
 (0)