CVE-2025-62379: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in reflex-dev reflex
Reflex is a library to build full-stack web apps in pure Python. In versions 0.5.4 through 0.8.14, the /auth-codespace endpoint automatically assigns the redirect_to query parameter value directly to client-side links without any validation and triggers automatic clicks when the page loads in a GitHub Codespaces environment. This allows attackers to redirect users to arbitrary external URLs. The vulnerable route is only registered when a Codespaces environment is detected, and the detection is controlled by environment variables. The same behavior can be activated in production if the GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN environment variable is set. The vulnerability occurs because the code assigns the redirect_to query parameter directly to a.href without any validation and immediately triggers a click (automatic navigation), allowing users to be sent to arbitrary external domains. The execution condition is based on the presence of a sessionStorage flag, meaning it triggers immediately on first visits or in incognito/private browsing windows, with no server-side origin/scheme whitelist or internal path enforcement defenses in place. This issue has been patched in version 0.8.15. As a workaround, users can ensure that GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN is not set in a production environment.
AI Analysis
Technical Summary
CVE-2025-62379 is classified as a CWE-601 (Open Redirect) vulnerability found in the reflex Python library, which is used for building full-stack web applications. The vulnerability exists in versions 0.5.4 through 0.8.14 within the /auth-codespace endpoint. This endpoint reads the redirect_to query parameter and assigns its value directly to the href attribute of a client-side anchor element without any validation or sanitization. Immediately after assignment, the code programmatically triggers a click event on this link, causing automatic navigation to the specified URL. The endpoint is conditionally registered only when the environment is detected as a GitHub Codespaces environment, controlled by environment variables such as GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN. If this environment variable is set in production, the vulnerability can be exploited outside Codespaces. The detection mechanism relies on a sessionStorage flag, causing the redirect to trigger on first visits or in incognito/private browsing modes. There is no server-side whitelist or origin enforcement, allowing arbitrary external URLs to be targeted. This vulnerability can be exploited by attackers to redirect users to malicious sites, facilitating phishing, credential theft, or malware delivery. The vulnerability does not impact confidentiality directly but can lead to indirect risks through social engineering. It requires user interaction (page load and automatic click) and has a CVSS v3.1 score of 3.1 (low severity). The issue was fixed in reflex version 0.8.15. As a mitigation, users should avoid setting the GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN environment variable in production environments.
Potential Impact
For European organizations, the primary risk posed by this vulnerability is the potential for phishing and social engineering attacks leveraging the open redirect to lure users to malicious websites. This can lead to credential compromise, malware infections, or unauthorized access if users are tricked into providing sensitive information or downloading harmful content. Although the vulnerability itself does not directly compromise system confidentiality or availability, the indirect consequences can be significant, especially for organizations with employees or customers using reflex-based applications in GitHub Codespaces or production environments where the vulnerable configuration exists. The automatic redirection without user awareness increases the risk of successful exploitation. Organizations relying on reflex in development or production should be aware that attackers could exploit this flaw to undermine user trust and potentially escalate attacks. However, the low CVSS score and requirement for user interaction limit the overall severity. The threat is more relevant to organizations with a strong presence in software development using GitHub Codespaces or reflex-based deployments.
Mitigation Recommendations
1. Upgrade reflex to version 0.8.15 or later, where the vulnerability is patched. 2. In production environments, ensure that the environment variable GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN is not set or removed to prevent activation of the vulnerable endpoint. 3. Implement strict input validation and sanitization for any redirect parameters, enforcing a whitelist of allowed domains or internal paths to prevent open redirects. 4. Educate users and developers about the risks of open redirects and encourage vigilance against suspicious URLs, especially those originating from reflex-based applications. 5. Monitor web application logs for unusual redirect_to parameter usage or unexpected redirection patterns. 6. If upgrading is not immediately possible, consider disabling or restricting access to the /auth-codespace endpoint in production environments. 7. Incorporate Content Security Policy (CSP) headers to restrict navigation to trusted domains, mitigating the impact of malicious redirects. 8. Conduct security reviews of environment variable configurations to avoid accidental exposure of Codespaces-specific variables in production.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland
CVE-2025-62379: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in reflex-dev reflex
Description
Reflex is a library to build full-stack web apps in pure Python. In versions 0.5.4 through 0.8.14, the /auth-codespace endpoint automatically assigns the redirect_to query parameter value directly to client-side links without any validation and triggers automatic clicks when the page loads in a GitHub Codespaces environment. This allows attackers to redirect users to arbitrary external URLs. The vulnerable route is only registered when a Codespaces environment is detected, and the detection is controlled by environment variables. The same behavior can be activated in production if the GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN environment variable is set. The vulnerability occurs because the code assigns the redirect_to query parameter directly to a.href without any validation and immediately triggers a click (automatic navigation), allowing users to be sent to arbitrary external domains. The execution condition is based on the presence of a sessionStorage flag, meaning it triggers immediately on first visits or in incognito/private browsing windows, with no server-side origin/scheme whitelist or internal path enforcement defenses in place. This issue has been patched in version 0.8.15. As a workaround, users can ensure that GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN is not set in a production environment.
AI-Powered Analysis
Technical Analysis
CVE-2025-62379 is classified as a CWE-601 (Open Redirect) vulnerability found in the reflex Python library, which is used for building full-stack web applications. The vulnerability exists in versions 0.5.4 through 0.8.14 within the /auth-codespace endpoint. This endpoint reads the redirect_to query parameter and assigns its value directly to the href attribute of a client-side anchor element without any validation or sanitization. Immediately after assignment, the code programmatically triggers a click event on this link, causing automatic navigation to the specified URL. The endpoint is conditionally registered only when the environment is detected as a GitHub Codespaces environment, controlled by environment variables such as GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN. If this environment variable is set in production, the vulnerability can be exploited outside Codespaces. The detection mechanism relies on a sessionStorage flag, causing the redirect to trigger on first visits or in incognito/private browsing modes. There is no server-side whitelist or origin enforcement, allowing arbitrary external URLs to be targeted. This vulnerability can be exploited by attackers to redirect users to malicious sites, facilitating phishing, credential theft, or malware delivery. The vulnerability does not impact confidentiality directly but can lead to indirect risks through social engineering. It requires user interaction (page load and automatic click) and has a CVSS v3.1 score of 3.1 (low severity). The issue was fixed in reflex version 0.8.15. As a mitigation, users should avoid setting the GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN environment variable in production environments.
Potential Impact
For European organizations, the primary risk posed by this vulnerability is the potential for phishing and social engineering attacks leveraging the open redirect to lure users to malicious websites. This can lead to credential compromise, malware infections, or unauthorized access if users are tricked into providing sensitive information or downloading harmful content. Although the vulnerability itself does not directly compromise system confidentiality or availability, the indirect consequences can be significant, especially for organizations with employees or customers using reflex-based applications in GitHub Codespaces or production environments where the vulnerable configuration exists. The automatic redirection without user awareness increases the risk of successful exploitation. Organizations relying on reflex in development or production should be aware that attackers could exploit this flaw to undermine user trust and potentially escalate attacks. However, the low CVSS score and requirement for user interaction limit the overall severity. The threat is more relevant to organizations with a strong presence in software development using GitHub Codespaces or reflex-based deployments.
Mitigation Recommendations
1. Upgrade reflex to version 0.8.15 or later, where the vulnerability is patched. 2. In production environments, ensure that the environment variable GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN is not set or removed to prevent activation of the vulnerable endpoint. 3. Implement strict input validation and sanitization for any redirect parameters, enforcing a whitelist of allowed domains or internal paths to prevent open redirects. 4. Educate users and developers about the risks of open redirects and encourage vigilance against suspicious URLs, especially those originating from reflex-based applications. 5. Monitor web application logs for unusual redirect_to parameter usage or unexpected redirection patterns. 6. If upgrading is not immediately possible, consider disabling or restricting access to the /auth-codespace endpoint in production environments. 7. Incorporate Content Security Policy (CSP) headers to restrict navigation to trusted domains, mitigating the impact of malicious redirects. 8. Conduct security reviews of environment variable configurations to avoid accidental exposure of Codespaces-specific variables in production.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-10T14:22:48.205Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68efc69b60c3b60ff6f859d3
Added to database: 10/15/2025, 4:06:51 PM
Last enriched: 10/15/2025, 4:09:13 PM
Last updated: 10/15/2025, 7:37:24 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11832: CWE-770 Allocation of Resources Without Limits or Throttling in Azure Access Technology BLU-IC2
CriticalCVE-2024-6592: CWE-306 Missing Authentication for Critical Function in WatchGuard Authentication Gateway
CriticalCVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
CriticalCVE-2025-62371: CWE-295: Improper Certificate Validation in opensearch-project data-prepper
HighCVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.