Description
A flaw was found in Red Hat Advanced Cluster Security (ACS). An unauthenticated remote attacker can exploit a vulnerability in the login interface's OAuth callback endpoint by crafting a malicious URL. This URL, containing unvalidated `error` and `error_uri` parameters, allows the attacker to display arbitrary error messages, leading to content spoofing. Furthermore, the attacker can redirect victims to malicious domains, effectively performing an open redirect under the guise of the trusted application's user interface.
Published: n/a
Score: 5.4 Medium
EPSS: n/a
KEV: No
Impact: Open Redirect and Content Spoofing
Action: Assess Impact
AI Analysis

Impact

A flaw in the OAuth callback endpoint of Red Hat Advanced Cluster Security (ACS) lets an unauthenticated attacker craft URLs with unvalidated error and error_uri parameters. The malicious link can cause the application to display arbitrary error messages, leading to content spoofing, and can redirect users to attacker‑controlled domains, effectively performing an open redirect under the trusted interface. This weakness is a classic example of CWE‑601 (Open Redirect). The consequences are primarily phishing or social‑engineering attacks rather than direct code execution, but the ability to trust the application’s UI can undermine user confidence and facilitate credential theft or other downstream attacks.

Affected Systems

The vulnerability affects Red Hat Advanced Cluster Security, a security platform for Kubernetes environments. No specific version ranges are listed, implying that all installations of ACS could be affected until a patch is applied. Users should review the release notes from Red Hat for a fix or consult the vendor’s advisory pages.

Risk and Exploitability

The CVSS score is 5.4, which reflects moderate severity. EPSS data is not available, and the issue is not currently listed in the CISA KEV catalog. The attack requires no authentication and can be launched remotely by any user who can visit the login interface with a crafted URL, so the attack vector is network‑based. Due to the lack of exploit data, the likelihood is uncertain, but the moderate score and unrestricted remote access indicate a tangible risk if the system is exposed to untrusted users.

Generated by OpenCVE AI on March 28, 2026 at 13:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether Red Hat has released a security update for ACS and apply the latest patch.
  • If no patch is available, consider restricting the OAuth callback endpoint to trusted domains or disabling it until a fix is released.
  • Configure a web application firewall or input validation rules to block or sanitize error and error_uri parameters from the OAuth callback URL.
  • Continuously monitor authentication logs for anomalous redirect or error messages that may indicate exploitation attempts.

Generated by OpenCVE AI on March 28, 2026 at 13:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in Red Hat Advanced Cluster Security (ACS). An unauthenticated remote attacker can exploit a vulnerability in the login interface's OAuth callback endpoint by crafting a malicious URL. This URL, containing unvalidated `error` and `error_uri` parameters, allows the attacker to display arbitrary error messages, leading to content spoofing. Furthermore, the attacker can redirect victims to malicious domains, effectively performing an open redirect under the guise of the trusted application's user interface.
Title rhacs: Red Hat Advanced Cluster Security (ACS): Open Redirect and Content Spoofing via OAuth callback endpoint
Weaknesses CWE-601
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}

threat_severity

Moderate


Subscriptions

No data.

cve-icon MITRE

No data.

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-27T00:00:00Z

Links: CVE-2026-4981 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:26:38Z

Weaknesses