Skip to main content

CVE-2022-35953: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in bookwyrm-social bookwyrm

Medium
Published: Fri Aug 12 2022 (08/12/2022, 20:15:13 UTC)
Source: CVE
Vendor/Project: bookwyrm-social
Product: bookwyrm

Description

BookWyrm is a social network for tracking your reading, talking about books, writing reviews, and discovering what to read next. Some links in BookWyrm may be vulnerable to tabnabbing, a form of phishing that gives attackers an opportunity to redirect a user to a malicious site. The issue was patched in version 0.4.5.

AI-Powered Analysis

AILast updated: 06/21/2025, 23:54:49 UTC

Technical Analysis

CVE-2022-35953 is a medium-severity vulnerability classified under CWE-601, which pertains to URL redirection to untrusted sites, commonly known as an 'open redirect' vulnerability. This issue affects versions of the BookWyrm social networking platform prior to 0.4.5. BookWyrm is a niche social network designed for book enthusiasts to track reading, discuss books, write reviews, and discover new reading material. The vulnerability arises because certain links within the platform can be manipulated to redirect users to malicious external websites without proper validation or sanitization of the redirect URLs. This flaw can be exploited in a tabnabbing attack, a phishing technique where an attacker tricks a user into clicking a seemingly legitimate link that opens a new tab or window, then changes the original tab to a malicious site. The victim may then be deceived into entering sensitive information or downloading malware. The vulnerability does not require authentication or user privileges beyond normal usage, but it does require user interaction in the form of clicking a crafted link. The issue was addressed and patched in BookWyrm version 0.4.5, mitigating the risk by presumably validating or restricting redirect URLs to trusted domains. There are no known exploits in the wild reported, and no CVSS score has been assigned, though the severity is considered medium based on the potential for phishing and social engineering attacks facilitated by this vulnerability.

Potential Impact

For European organizations using BookWyrm, particularly those involved in literary communities, educational institutions, or cultural organizations, this vulnerability could facilitate targeted phishing campaigns. Attackers could exploit the open redirect to lure users into malicious sites designed to steal credentials, deploy malware, or conduct further social engineering attacks. While the platform itself is not a critical infrastructure component, the compromise of user accounts or the spread of malware through trusted community links could lead to reputational damage and potential data breaches. The impact on confidentiality is moderate, as attackers could capture login credentials or personal data entered on phishing sites. Integrity and availability impacts are low since the vulnerability does not directly allow data manipulation or service disruption. However, the social trust model of the platform could be undermined, affecting user confidence and engagement. Given the user interaction requirement, the attack vector relies on successful phishing, which may limit widespread exploitation but still poses a significant risk to less security-aware users.

Mitigation Recommendations

European organizations and BookWyrm users should ensure that their installations are updated to version 0.4.5 or later, where the vulnerability has been patched. Administrators should audit any custom integrations or plugins that might bypass the core platform's redirect validation. Additionally, organizations can implement web filtering solutions to block known malicious domains and monitor outbound traffic for suspicious redirects. User education is critical: training users to recognize phishing attempts and to verify URLs before clicking can reduce the risk of exploitation. For organizations hosting BookWyrm instances, enabling Content Security Policy (CSP) headers that restrict navigation and framing can help mitigate tabnabbing risks. Logging and monitoring for unusual redirect patterns or spikes in outbound traffic to untrusted domains can provide early detection of exploitation attempts. Finally, consider implementing multi-factor authentication (MFA) on user accounts to reduce the impact of credential theft resulting from phishing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf67d9

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 11:54:49 PM

Last updated: 8/15/2025, 10:01:25 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats