URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-50182
Summary
The package urllib3 is a user-friendly HTTP client library for Python. In versions 2.2.0 through 2.4.0, urllib3 does not control redirects in browsers and Node.js. The urllib3 supports being used in a Pyodide runtime, utilizing the JavaScript Fetch API or falling back on XMLHttpRequest. This means Python libraries can be used to make HTTP requests from a browser or Node.js. Additionally, urllib3 provides a mechanism to control redirects, but the `retries` and `redirect` parameters are ignored with Pyodide; the runtime itself determines redirect behavior.
- HIGH
- NETWORK
- NONE
- UNCHANGED
- NONE
- LOW
- HIGH
- NONE
CWE-601 - Open Redirect
An open redirect attack employs a URL parameter, HTML refresh tags, or a DOM based location change to exploit the trust of a vulnerable domain to direct the users to a malicious website. The attack could lead to higher severity vulnerabilities such as unauthorized access control, account takeover, XSS, and more.
References
Advisory Timeline
- Published