An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-47065 An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 17 Jul 2025 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Pribai
Pribai privategpt
CPEs cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:*
Vendors & Products Pribai
Pribai privategpt
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T21:25:03.038Z

Reserved: 2024-06-12T20:23:55.084Z

Link: CVE-2024-5936

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.038Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-27T19:15:18.317

Modified: 2025-07-17T01:43:16.010

Link: CVE-2024-5936

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.