CVE-2026-2153

A vulnerability was determined in mwielgoszewski doorman up to 0.6. This issue affects the function is_safe_url of the file doorman/users/views.py. Executing a manipulation of the argument Next can lead to open redirect. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
References
Link Resource
https://gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924 Exploit Third Party Advisory
https://vuldb.com/?ctiid.344855 Permissions Required VDB Entry
https://vuldb.com/?id.344855 Third Party Advisory VDB Entry
https://vuldb.com/?submit.748072 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:mwielgoszewski:doorman:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-08 13:16

Updated : 2026-03-05 21:29


NVD link : CVE-2026-2153

Mitre link : CVE-2026-2153

CVE.ORG link : CVE-2026-2153


JSON object : View

Products Affected

mwielgoszewski

  • doorman
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')