Description
An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47065 | An open redirect vulnerability exists in imartinez/privategpt version 0.5.0 due to improper handling of the 'file' parameter. This vulnerability allows attackers to redirect users to a URL specified by user-controlled input without proper validation or sanitization. The impact of this vulnerability includes potential phishing attacks, malware distribution, and credential theft. |
References
History
Thu, 17 Jul 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pribai
Pribai privategpt |
|
| CPEs | cpe:2.3:a:pribai:privategpt:0.5.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Pribai
Pribai privategpt |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:25:03.038Z
Reserved: 2024-06-12T20:23:55.084Z
Link: CVE-2024-5936
Updated: 2024-08-01T21:25:03.038Z
Status : Analyzed
Published: 2024-06-27T19:15:18.317
Modified: 2025-07-17T01:43:16.010
Link: CVE-2024-5936
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD