Description
XenForo before 2.2.17 and 2.3.1 allows open redirect via a specially crafted URL. The getDynamicRedirect() function does not adequately validate the redirect target, allowing attackers to redirect users to arbitrary external sites using crafted URLs containing newlines, user credentials, or host mismatches.
Published: 2026-04-01
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows attackers to force users to visit arbitrary external URLs by manipulating the getDynamicRedirect() endpoint. The flaw arises because the function lacks proper validation of the redirect target, permitting inputs containing newlines, embedded user credentials, or host mismatches. Because the redirect can point to any domain, users may be exposed to phishing, credential harvesting, or malware without their consent, although it does not grant direct code execution or data exfiltration.

Affected Systems

XenForo forum software, specifically all releases before version 2.2.17 and 2.3.1, is affected. Administrators of XenForo installations running 2.2.x below 2.2.17 or 2.3.x below 2.3.1 are vulnerable. The vendor published a patch in the 2.2.17 and 2.3.1 releases, so upgrading to those or later versions resolves the problem.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score below 1% suggests a low probability of exploitation. XenForo has not been listed in the CISA KEV catalog, implying no known widespread exploits yet. Attackers can trigger the redirect by crafting a malicious URL that targets the getDynamicRedirect endpoint, including newline characters or credentials to subvert normal URL parsing. The primary vector is a luring link that a logged‑in or anonymous user clicks, resulting in a client‑side redirect. Because no privilege escalation is required, a broad user base may be affected if the site is widely accessed.

Generated by OpenCVE AI on April 2, 2026 at 02:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade XenForo to version 2.2.17 or later (or 2.3.1 or later) to apply the vendor fix.
  • Verify that the getDynamicRedirect handling has been updated by testing a known redirect URL after the upgrade.
  • If an upgrade cannot be performed immediately, enforce a web‑application firewall rule to block or redirect requests with suspicious parameters targeting getDynamicRedirect.
  • Continuously monitor web traffic and logs for attempted redirects to unapproved external domains.

Generated by OpenCVE AI on April 2, 2026 at 02:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:xenforo:xenforo:2.3.0:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description XenForo before 2.2.17 and 2.3.1 allows open redirect via a specially crafted URL. The getDynamicRedirect() function does not adequately validate the redirect target, allowing attackers to redirect users to arbitrary external sites using crafted URLs containing newlines, user credentials, or host mismatches.
Title XenForo Open Redirect via getDynamicRedirect
First Time appeared Xenforo
Xenforo xenforo
Weaknesses CWE-601
CPEs cpe:2.3:a:xenforo:xenforo:*:*:*:*:*:*:*:*
Vendors & Products Xenforo
Xenforo xenforo
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-01T13:43:45.319Z

Reserved: 2026-04-01T00:19:58.384Z

Link: CVE-2024-58342

cve-icon Vulnrichment

Updated: 2026-04-01T13:43:17.165Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T01:16:39.100

Modified: 2026-04-01T18:54:10.510

Link: CVE-2024-58342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:09:48Z

Weaknesses