Description
Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirect and router.push. An attacker can craft a malicious link that, when opened by an authenticated user, performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. This vulnerability is fixed in 1.57.0.
Published: 2026-04-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Client-side Code Execution
Action: Patch
AI Analysis

Impact

Homarr, an open-source dashboard, contains a DOM-based Cross-Site Scripting vulnerability in the /auth/login page. The application mistakenly trusts the "callbackUrl" URL parameter, passing it directly to the redirect function. An attacker can craft a malicious link that, when accessed by an authenticated user, forces a client-side redirect and injects arbitrary JavaScript into the browser. This leads to credential theft, potential internal network pivoting, and the execution of unauthorized actions in the victim’s context. The weakness is classified as CWE‑601 (Open Redirect) and CWE‑87 (Insertion of Code with Unescaped Input).

Affected Systems

The flaw affects homarr-labs' Homarr product versions prior to 1.57.0. Any deployment of Homarr running an earlier release and exposing the /auth/login endpoint is vulnerable.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity, while the very low EPSS score (<1%) suggests that exploitation is currently uncommon. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the victim to be authenticated and to click the crafted link. Once triggered, the attacker can run JavaScript in the user's browser, enabling a range of client-side attacks such as session hijacking or phishing.*

Generated by OpenCVE AI on April 9, 2026 at 19:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Homarr to version 1.57.0 or later.

Generated by OpenCVE AI on April 9, 2026 at 19:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Homarr
Homarr homarr
CPEs cpe:2.3:a:homarr:homarr:*:*:*:*:*:*:*:*
Vendors & Products Homarr
Homarr homarr

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Homarr-labs
Homarr-labs homarr
Vendors & Products Homarr-labs
Homarr-labs homarr

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirect and router.push. An attacker can craft a malicious link that, when opened by an authenticated user, performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. This vulnerability is fixed in 1.57.0.
Title DOM-Based XSS in Homarr /auth/login Redirect
Weaknesses CWE-601
CWE-87
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T15:41:01.491Z

Reserved: 2026-03-20T16:59:08.889Z

Link: CVE-2026-33510

cve-icon Vulnrichment

Updated: 2026-04-06T15:31:44.902Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T15:17:10.790

Modified: 2026-04-09T18:40:47.480

Link: CVE-2026-33510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:17Z

Weaknesses