CVE-2022-35953: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in bookwyrm-social bookwyrm
BookWyrm is a social network for tracking your reading, talking about books, writing reviews, and discovering what to read next. Some links in BookWyrm may be vulnerable to tabnabbing, a form of phishing that gives attackers an opportunity to redirect a user to a malicious site. The issue was patched in version 0.4.5.
AI Analysis
Technical Summary
CVE-2022-35953 is a medium-severity vulnerability classified under CWE-601, which pertains to URL redirection to untrusted sites, commonly known as an 'open redirect' vulnerability. This issue affects versions of the BookWyrm social networking platform prior to 0.4.5. BookWyrm is a niche social network designed for book enthusiasts to track reading, discuss books, write reviews, and discover new reading material. The vulnerability arises because certain links within the platform can be manipulated to redirect users to malicious external websites without proper validation or sanitization of the redirect URLs. This flaw can be exploited in a tabnabbing attack, a phishing technique where an attacker tricks a user into clicking a seemingly legitimate link that opens a new tab or window, then changes the original tab to a malicious site. The victim may then be deceived into entering sensitive information or downloading malware. The vulnerability does not require authentication or user privileges beyond normal usage, but it does require user interaction in the form of clicking a crafted link. The issue was addressed and patched in BookWyrm version 0.4.5, mitigating the risk by presumably validating or restricting redirect URLs to trusted domains. There are no known exploits in the wild reported, and no CVSS score has been assigned, though the severity is considered medium based on the potential for phishing and social engineering attacks facilitated by this vulnerability.
Potential Impact
For European organizations using BookWyrm, particularly those involved in literary communities, educational institutions, or cultural organizations, this vulnerability could facilitate targeted phishing campaigns. Attackers could exploit the open redirect to lure users into malicious sites designed to steal credentials, deploy malware, or conduct further social engineering attacks. While the platform itself is not a critical infrastructure component, the compromise of user accounts or the spread of malware through trusted community links could lead to reputational damage and potential data breaches. The impact on confidentiality is moderate, as attackers could capture login credentials or personal data entered on phishing sites. Integrity and availability impacts are low since the vulnerability does not directly allow data manipulation or service disruption. However, the social trust model of the platform could be undermined, affecting user confidence and engagement. Given the user interaction requirement, the attack vector relies on successful phishing, which may limit widespread exploitation but still poses a significant risk to less security-aware users.
Mitigation Recommendations
European organizations and BookWyrm users should ensure that their installations are updated to version 0.4.5 or later, where the vulnerability has been patched. Administrators should audit any custom integrations or plugins that might bypass the core platform's redirect validation. Additionally, organizations can implement web filtering solutions to block known malicious domains and monitor outbound traffic for suspicious redirects. User education is critical: training users to recognize phishing attempts and to verify URLs before clicking can reduce the risk of exploitation. For organizations hosting BookWyrm instances, enabling Content Security Policy (CSP) headers that restrict navigation and framing can help mitigate tabnabbing risks. Logging and monitoring for unusual redirect patterns or spikes in outbound traffic to untrusted domains can provide early detection of exploitation attempts. Finally, consider implementing multi-factor authentication (MFA) on user accounts to reduce the impact of credential theft resulting from phishing.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2022-35953: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in bookwyrm-social bookwyrm
Description
BookWyrm is a social network for tracking your reading, talking about books, writing reviews, and discovering what to read next. Some links in BookWyrm may be vulnerable to tabnabbing, a form of phishing that gives attackers an opportunity to redirect a user to a malicious site. The issue was patched in version 0.4.5.
AI-Powered Analysis
Technical Analysis
CVE-2022-35953 is a medium-severity vulnerability classified under CWE-601, which pertains to URL redirection to untrusted sites, commonly known as an 'open redirect' vulnerability. This issue affects versions of the BookWyrm social networking platform prior to 0.4.5. BookWyrm is a niche social network designed for book enthusiasts to track reading, discuss books, write reviews, and discover new reading material. The vulnerability arises because certain links within the platform can be manipulated to redirect users to malicious external websites without proper validation or sanitization of the redirect URLs. This flaw can be exploited in a tabnabbing attack, a phishing technique where an attacker tricks a user into clicking a seemingly legitimate link that opens a new tab or window, then changes the original tab to a malicious site. The victim may then be deceived into entering sensitive information or downloading malware. The vulnerability does not require authentication or user privileges beyond normal usage, but it does require user interaction in the form of clicking a crafted link. The issue was addressed and patched in BookWyrm version 0.4.5, mitigating the risk by presumably validating or restricting redirect URLs to trusted domains. There are no known exploits in the wild reported, and no CVSS score has been assigned, though the severity is considered medium based on the potential for phishing and social engineering attacks facilitated by this vulnerability.
Potential Impact
For European organizations using BookWyrm, particularly those involved in literary communities, educational institutions, or cultural organizations, this vulnerability could facilitate targeted phishing campaigns. Attackers could exploit the open redirect to lure users into malicious sites designed to steal credentials, deploy malware, or conduct further social engineering attacks. While the platform itself is not a critical infrastructure component, the compromise of user accounts or the spread of malware through trusted community links could lead to reputational damage and potential data breaches. The impact on confidentiality is moderate, as attackers could capture login credentials or personal data entered on phishing sites. Integrity and availability impacts are low since the vulnerability does not directly allow data manipulation or service disruption. However, the social trust model of the platform could be undermined, affecting user confidence and engagement. Given the user interaction requirement, the attack vector relies on successful phishing, which may limit widespread exploitation but still poses a significant risk to less security-aware users.
Mitigation Recommendations
European organizations and BookWyrm users should ensure that their installations are updated to version 0.4.5 or later, where the vulnerability has been patched. Administrators should audit any custom integrations or plugins that might bypass the core platform's redirect validation. Additionally, organizations can implement web filtering solutions to block known malicious domains and monitor outbound traffic for suspicious redirects. User education is critical: training users to recognize phishing attempts and to verify URLs before clicking can reduce the risk of exploitation. For organizations hosting BookWyrm instances, enabling Content Security Policy (CSP) headers that restrict navigation and framing can help mitigate tabnabbing risks. Logging and monitoring for unusual redirect patterns or spikes in outbound traffic to untrusted domains can provide early detection of exploitation attempts. Finally, consider implementing multi-factor authentication (MFA) on user accounts to reduce the impact of credential theft resulting from phishing.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf67d9
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:54:49 PM
Last updated: 8/15/2025, 10:01:25 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.