Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00058}

epss

{'score': 0.00063}


Thu, 13 Feb 2025 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat discovery
Redhat openshift
CPEs cpe:/a:redhat:openshift:4.17::el9
cpe:/a:redhat:openshift_data_foundation:4.14::el9
cpe:/a:redhat:openshift_data_foundation:4.15::el9
cpe:/o:redhat:discovery:1.0::el9
Vendors & Products Redhat discovery
Redhat openshift

Fri, 13 Dec 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhboac Hawtio
CPEs cpe:/a:redhat:rhboac_hawtio:4.0.0
Vendors & Products Redhat rhboac Hawtio

Thu, 12 Dec 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Distributed Tracing
CPEs cpe:/a:redhat:openshift_distributed_tracing:3.4::el8
Vendors & Products Redhat openshift Distributed Tracing

Tue, 10 Dec 2024 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhmt
CPEs cpe:/a:redhat:rhmt:1.8::el8
Vendors & Products Redhat rhmt

Thu, 31 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift_data_foundation:4.17::el9
cpe:/a:redhat:openshift_gitops:1.12::el8
cpe:/a:redhat:openshift_gitops:1.12::el9

Wed, 30 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Gitops
CPEs cpe:/a:redhat:openshift_gitops:1.13::el8
Vendors & Products Redhat openshift Gitops

Tue, 22 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat network Observ Optr
CPEs cpe:/a:redhat:network_observ_optr:1.7.0::el9
Vendors & Products Redhat network Observ Optr

Wed, 16 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Data Foundation
CPEs cpe:/a:redhat:openshift_data_foundation:4.16::el9
Vendors & Products Redhat openshift Data Foundation

Tue, 15 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift Serverless
CPEs cpe:/a:redhat:openshift_serverless:1.34::el8
Vendors & Products Redhat openshift Serverless

Tue, 08 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat service Mesh
CPEs cpe:/a:redhat:service_mesh:2.6::el8
cpe:/a:redhat:service_mesh:2.6::el9
Vendors & Products Redhat
Redhat service Mesh

Fri, 20 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Openjsf
Openjsf express
CPEs cpe:2.3:a:openjsf:express:*:*:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha1:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha2:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha3:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha4:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha5:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha6:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha7:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:alpha8:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:beta1:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:beta2:*:*:*:node.js:*:*
cpe:2.3:a:openjsf:express:5.0.0:beta3:*:*:*:node.js:*:*
Vendors & Products Openjsf
Openjsf express

Tue, 10 Sep 2024 19:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 10 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
Description Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
Title express vulnerable to XSS via response.redirect()
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-10T15:58:45.956Z

Reserved: 2024-08-16T14:20:37.325Z

Link: CVE-2024-43796

cve-icon Vulnrichment

Updated: 2024-09-10T15:58:41.001Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-10T15:15:17.510

Modified: 2024-09-20T16:07:47.997

Link: CVE-2024-43796

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-09-10T15:15:17Z

Links: CVE-2024-43796 - Bugzilla

cve-icon OpenCVE Enrichment

No data.