URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-50181
Summary
The package urllib3 is a user-friendly HTTP client library for Python. In versions prior to 2.5.0, it is possible to disable redirects for all requests by instantiating a `PoolManager` and specifying `retries` in a way that disable redirects. By default, requests and botocore users are not affected. An application attempting to mitigate Server-Side Request Forgery (SSRF) or Open Redirect vulnerabilities by disabling redirects at the `PoolManager` level will remain vulnerable.
- HIGH
- NETWORK
- NONE
- UNCHANGED
- NONE
- LOW
- HIGH
- NONE
CWE-601 - Open Redirect
An open redirect attack employs a URL parameter, HTML refresh tags, or a DOM based location change to exploit the trust of a vulnerable domain to direct the users to a malicious website. The attack could lead to higher severity vulnerabilities such as unauthorized access control, account takeover, XSS, and more.
References
Advisory Timeline
- Published