Skip to main content

URL Redirection to Untrusted Site ('Open Redirect')


Severity High
Score 8.1/10


Applications that use "UriComponentsBuilder" to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to an Open Redirect attack or a SSRF attack if the URL is used after passing validation checks. This issue affects org.springframework:spring-web versions through 5.3.31, 6.0.0-M1 through 6.0.16, and 6.1.0-M1 through 6.1.3.

  • LOW
  • HIGH
  • NONE
  • HIGH
  • NONE

CWE-601 - Open Redirect

An open redirect attack employs a URL parameter, HTML refresh tags, or a DOM based location change to exploit the trust of a vulnerable domain to direct the users to a malicious website. The attack could lead to higher severity vulnerabilities such as unauthorized access control, account takeover, XSS, and more.

Advisory Timeline

  • Published