URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-32962
Summary
Flask-AppBuilder is an application development framework built on top of Flask. In Flask-AppBuilder package versions prior to 4.6.2rc1 and 5.x prior to 5.0.0a8 would allow for a malicious unauthenticated actor to perform an Open Redirect by manipulating the Host header in HTTP requests. Flask-AppBuilder fix introduced the `FAB_SAFE_REDIRECT_HOSTS` configuration variable, which allows administrators to explicitly define which domains are considered safe for redirection. As a workaround, use a reverse proxy to enforce trusted host headers.
- LOW
- NETWORK
- LOW
- CHANGED
- REQUIRED
- NONE
- LOW
- NONE
CWE-601 - Open Redirect
An open redirect attack employs a URL parameter, HTML refresh tags, or a DOM based location change to exploit the trust of a vulnerable domain to direct the users to a malicious website. The attack could lead to higher severity vulnerabilities such as unauthorized access control, account takeover, XSS, and more.
References
Advisory Timeline
- Published