A vulnerability was determined in mwielgoszewski doorman up to 0.6. This issue affects the function is_safe_url of the file doorman/users/views.py. Executing a manipulation of the argument Next can lead to open redirect. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
References
| Link | Resource |
|---|---|
| https://gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.344855 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344855 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.748072 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-08 13:16
Updated : 2026-03-05 21:29
NVD link : CVE-2026-2153
Mitre link : CVE-2026-2153
CVE.ORG link : CVE-2026-2153
JSON object : View
Products Affected
mwielgoszewski
- doorman
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
