Impact
Pachno 1.0.6 contains a flaw that lets attackers set the return_to parameter to any URL, causing users to be redirected to malicious sites. This can lead to phishing, credential harvesting, and other social‑engineering attacks. The weakness arises from insufficient validation of the parameter, categorized as CWE‑305.
Affected Systems
The issue affects the Pachno project management tool from the vendor pancho, specifically version 1.0.6.
Risk and Exploitability
The vulnerability carries a CVSS base score of 7.1, indicating a high risk to users. No EPSS data is available and it is not listed in the CISA KEV catalog, so the probability of widespread exploitation remains unclear. Attackers can exploit the flaw remotely by forging a login URL with a crafted return_to value, which does not require authentication and can be shared publicly.
OpenCVE Enrichment