Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5923-r76v-mprm | Open Redirect Vulnerability in Taguette |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Taguette
Taguette taguette |
|
| Vendors & Products |
Taguette
Taguette taguette |
Wed, 10 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Taguette is an open source qualitative research tool. In versions 1.5.1 and below, attackers can craft malicious URLs that redirect users to arbitrary external websites after authentication. The application accepts a user-controlled next parameter and uses it directly in HTTP redirects without any validation. This can be exploited for phishing attacks where victims believe they are interacting with a trusted Taguette instance but are redirected to a malicious site designed to steal credentials or deliver malware. This issue is fixed in version 1.5.2. | |
| Title | Taguette does not safeguard against Open Redirect | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-10T15:38:54.717Z
Reserved: 2025-12-08T21:19:11.206Z
Link: CVE-2025-67502
Updated: 2025-12-10T15:38:51.656Z
Status : Awaiting Analysis
Published: 2025-12-10T00:16:11.600
Modified: 2025-12-12T15:19:07.567
Link: CVE-2025-67502
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:48:53Z
Github GHSA