Description
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
Published: 2024-01-02
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0377 Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
Github GHSA Github GHSA GHSA-jchw-25xp-jwwc Follow Redirects improperly handles URLs in the url.parse() function
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Tue, 17 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat cluster Observability Operator
CPEs cpe:/a:redhat:cluster_observability_operator:1.0::el8
Vendors & Products Redhat cluster Observability Operator

Mon, 11 Nov 2024 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat acm
Redhat multicluster Engine
CPEs cpe:/a:redhat:acm:2.9::el8
cpe:/a:redhat:multicluster_engine:2.4::el8
Vendors & Products Redhat acm
Redhat multicluster Engine

Subscriptions

Follow-redirects Follow Redirects
Redhat Acm Cluster Observability Operator Container Native Virtualization Logging Migration Toolkit Applications Migration Toolkit Runtimes Migration Toolkit Virtualization Multicluster Engine Network Observ Optr Openshift Openshift Data Foundation Openshift Distributed Tracing Service Mesh
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2025-11-03T21:47:30.161Z

Reserved: 2023-02-20T10:28:48.931Z

Link: CVE-2023-26159

cve-icon Vulnrichment

Updated: 2025-11-03T21:47:30.161Z

cve-icon NVD

Status : Modified

Published: 2024-01-02T05:15:08.630

Modified: 2025-11-03T22:16:05.953

Link: CVE-2023-26159

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-02T00:00:00Z

Links: CVE-2023-26159 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses