Description
A vulnerability was determined in lcg0124 BootDo up to 5ccd963c74058036b466e038cff37de4056c1600. Affected by this vulnerability is the function redirectToLogin of the file AccessControlFilter.java of the component Host Header Handler. This manipulation of the argument Hostname causes open redirect. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
Published: 2026-01-25
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect
Action: Patch
AI Analysis

Impact

The vulnerability is an open redirect in the redirectToLogin function of the Host Header Handler. Manipulating the Host header can cause the application to redirect users to arbitrary URLs, which can be used for phishing or drive‑by attacks. This weakness allows an attacker to influence user navigation without needing to compromise the system, impacting user trust and potentially leading to credential theft.

Affected Systems

The affected product is lcg0124 BootDo, a web application built on the BootDo framework. Any deployment up to the code commit 5ccd963c74058036b466e038cff37de4056c1600 is vulnerable. No specific version numbers are listed due to the product’s rolling‑release model.

Risk and Exploitability

The CVSS base score of 5.1 places the problem in the medium severity range, and the EPSS score of less than 1% suggests that the likelihood of exploitation is low in the current environment. The vulnerability is not yet listed in CISA’s KEV catalog. An attacker can trigger the exploit remotely by sending a crafted HTTP request with a malicious Host header that causes the application to redirect the victim to an attacker‑controlled site. Because the application appears to rely on the Host header without proper validation, successful exploitation would depend only on network connectivity to the target and the victim’s willingness to click the redirected link.

Generated by OpenCVE AI on April 18, 2026 at 02:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Patch BootDo to a revision that contains the commit 5ccd963c74058036b466e038cff37de4056c1600, which addresses the redirectToLogin behavior.
  • Validate the Host header so that only known, trusted hostnames are accepted before performing redirects or enforce that redirects target absolute URLs within the same domain.
  • Deploy a web application firewall or similar runtime protection that detects and blocks open‑redirect attempts based on patterns in the Host header or redirect URLs.

Generated by OpenCVE AI on April 18, 2026 at 02:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Lcg0124
Lcg0124 bootdo
Vendors & Products Lcg0124
Lcg0124 bootdo

Sun, 25 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in lcg0124 BootDo up to 5ccd963c74058036b466e038cff37de4056c1600. Affected by this vulnerability is the function redirectToLogin of the file AccessControlFilter.java of the component Host Header Handler. This manipulation of the argument Hostname causes open redirect. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
Title lcg0124 BootDo Host Header AccessControlFilter.java redirectToLogin
Weaknesses CWE-601
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:53:49.084Z

Reserved: 2026-01-24T19:20:25.676Z

Link: CVE-2026-1406

cve-icon Vulnrichment

Updated: 2026-01-26T17:32:27.263Z

cve-icon NVD

Status : Deferred

Published: 2026-01-25T12:15:46.983

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1406

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:00:10Z

Weaknesses