Description
Masa CMS is affected by an Open Redirect vulnerability due to improper handling of scheme-relative URLs. The application incorrectly interprets paths beginning with double slashes (//) as internal paths, failing to validate the redirect target before processing. The application treats these values as internal paths and processes them without confirming that the redirect target remains on the local site.

An attacker can craft a URL on the trusted Masa CMS domain that redirects a victim to an external attacker-controlled site. This can be used for phishing and, in some authentication flows, may expose tokens or other sensitive data to the external site. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, reject or rewrite redirect parameters that begin with // and consider disabling forceDirectoryStructure if compatible with the deployment.
Published: 2026-05-06
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from improper handling of scheme-relative URLs, where paths beginning with double slashes are treated as internal redirects. An attacker can craft a URL on a trusted Masa CMS domain that forwards a victim to an external, attacker-controlled site. This can be used for phishing campaigns and, in some authentication flows, may inadvertently expose tokens or other sensitive data to the malicious destination. The weakness is classified as CWE‑601.

Affected Systems

Affected products are MasaCMS MasaCMS. Versions prior to 7.2.10, 7.3.15, 7.4.10, or 7.5.3 are vulnerable; later releases include the fix.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. EPSS is not available, and the issue is not listed in the CISA KEV catalog. The likely attack vector is a crafted link sent to users on the trusted domain; no special privileges are required, making exploitation plausible in phishing scenarios.

Generated by OpenCVE AI on May 6, 2026 at 22:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MasaCMS to version 7.2.10, 7.3.15, 7.4.10, or 7.5.3 or later.
  • If a patch is not available immediately, reject or rewrite any redirect parameters that begin with ‘//’ to ensure the target remains within the local site.
  • As a further precaution, consider disabling the forceDirectoryStructure setting if the deployment allows, which prevents improper handling of scheme-relative URLs.

Generated by OpenCVE AI on May 6, 2026 at 22:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 23:30:00 +0000

Type Values Removed Values Added
First Time appeared Masacms
Masacms masacms
Vendors & Products Masacms
Masacms masacms

Wed, 06 May 2026 21:00:00 +0000

Type Values Removed Values Added
Description Masa CMS is affected by an Open Redirect vulnerability due to improper handling of scheme-relative URLs. The application incorrectly interprets paths beginning with double slashes (//) as internal paths, failing to validate the redirect target before processing. The application treats these values as internal paths and processes them without confirming that the redirect target remains on the local site. An attacker can craft a URL on the trusted Masa CMS domain that redirects a victim to an external attacker-controlled site. This can be used for phishing and, in some authentication flows, may expose tokens or other sensitive data to the external site. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, reject or rewrite redirect parameters that begin with // and consider disabling forceDirectoryStructure if compatible with the deployment.
Title Masa CMS open redirect via improper handling of scheme-relative URLs
Weaknesses CWE-601
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-06T20:13:18.357Z

Reserved: 2026-04-10T22:50:01.357Z

Link: CVE-2026-40332

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-06T21:16:01.503

Modified: 2026-05-06T21:22:50.760

Link: CVE-2026-40332

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T23:15:17Z

Weaknesses