Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-67713

Опубликовано: 11 дек. 2025
Источник: debian

Описание

Miniflux 2 is an open source feed reader. Versions 2.2.14 and below treat redirect_url as safe when url.Parse(...).IsAbs() is false, enabling phishing flows after login. Protocol-relative URLs like //ikotaslabs.com have an empty scheme and pass that check, allowing post-login redirects to attacker-controlled sites. This issue is fixed in version 2.2.15.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
minifluxfixed2.2.16-1package
minifluxno-dsatrixiepackage

Примечания

  • https://github.com/miniflux/v2/security/advisories/GHSA-wqv2-4wpg-8hc9

  • Fixed by: https://github.com/miniflux/v2/commit/76df99f3a3db234cf6b312be5e771485213d03c7 (2.2.15)

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 2 месяцев назад

Miniflux 2 is an open source feed reader. Versions 2.2.14 and below treat redirect_url as safe when url.Parse(...).IsAbs() is false, enabling phishing flows after login. Protocol-relative URLs like //ikotaslabs.com have an empty scheme and pass that check, allowing post-login redirects to attacker-controlled sites. This issue is fixed in version 2.2.15.

CVSS3: 6.1
nvd
около 2 месяцев назад

Miniflux 2 is an open source feed reader. Versions 2.2.14 and below treat redirect_url as safe when url.Parse(...).IsAbs() is false, enabling phishing flows after login. Protocol-relative URLs like //ikotaslabs.com have an empty scheme and pass that check, allowing post-login redirects to attacker-controlled sites. This issue is fixed in version 2.2.15.

github
около 2 месяцев назад

Miniflux has an Open Redirect via protocol-relative redirect_url

Уязвимость CVE-2025-67713