Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62379: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in reflex-dev reflex

0
Low
VulnerabilityCVE-2025-62379cvecve-2025-62379cwe-601
Published: Wed Oct 15 2025 (10/15/2025, 15:57:57 UTC)
Source: CVE Database V5
Vendor/Project: reflex-dev
Product: reflex

Description

Reflex is a library to build full-stack web apps in pure Python. In versions 0.5.4 through 0.8.14, the /auth-codespace endpoint automatically assigns the redirect_to query parameter value directly to client-side links without any validation and triggers automatic clicks when the page loads in a GitHub Codespaces environment. This allows attackers to redirect users to arbitrary external URLs. The vulnerable route is only registered when a Codespaces environment is detected, and the detection is controlled by environment variables. The same behavior can be activated in production if the GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN environment variable is set. The vulnerability occurs because the code assigns the redirect_to query parameter directly to a.href without any validation and immediately triggers a click (automatic navigation), allowing users to be sent to arbitrary external domains. The execution condition is based on the presence of a sessionStorage flag, meaning it triggers immediately on first visits or in incognito/private browsing windows, with no server-side origin/scheme whitelist or internal path enforcement defenses in place. This issue has been patched in version 0.8.15. As a workaround, users can ensure that GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN is not set in a production environment.

AI-Powered Analysis

AILast updated: 10/15/2025, 16:09:13 UTC

Technical Analysis

CVE-2025-62379 is classified as a CWE-601 (Open Redirect) vulnerability found in the reflex Python library, which is used for building full-stack web applications. The vulnerability exists in versions 0.5.4 through 0.8.14 within the /auth-codespace endpoint. This endpoint reads the redirect_to query parameter and assigns its value directly to the href attribute of a client-side anchor element without any validation or sanitization. Immediately after assignment, the code programmatically triggers a click event on this link, causing automatic navigation to the specified URL. The endpoint is conditionally registered only when the environment is detected as a GitHub Codespaces environment, controlled by environment variables such as GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN. If this environment variable is set in production, the vulnerability can be exploited outside Codespaces. The detection mechanism relies on a sessionStorage flag, causing the redirect to trigger on first visits or in incognito/private browsing modes. There is no server-side whitelist or origin enforcement, allowing arbitrary external URLs to be targeted. This vulnerability can be exploited by attackers to redirect users to malicious sites, facilitating phishing, credential theft, or malware delivery. The vulnerability does not impact confidentiality directly but can lead to indirect risks through social engineering. It requires user interaction (page load and automatic click) and has a CVSS v3.1 score of 3.1 (low severity). The issue was fixed in reflex version 0.8.15. As a mitigation, users should avoid setting the GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN environment variable in production environments.

Potential Impact

For European organizations, the primary risk posed by this vulnerability is the potential for phishing and social engineering attacks leveraging the open redirect to lure users to malicious websites. This can lead to credential compromise, malware infections, or unauthorized access if users are tricked into providing sensitive information or downloading harmful content. Although the vulnerability itself does not directly compromise system confidentiality or availability, the indirect consequences can be significant, especially for organizations with employees or customers using reflex-based applications in GitHub Codespaces or production environments where the vulnerable configuration exists. The automatic redirection without user awareness increases the risk of successful exploitation. Organizations relying on reflex in development or production should be aware that attackers could exploit this flaw to undermine user trust and potentially escalate attacks. However, the low CVSS score and requirement for user interaction limit the overall severity. The threat is more relevant to organizations with a strong presence in software development using GitHub Codespaces or reflex-based deployments.

Mitigation Recommendations

1. Upgrade reflex to version 0.8.15 or later, where the vulnerability is patched. 2. In production environments, ensure that the environment variable GITHUB_CODESPACES_PORT_FORWARDING_DOMAIN is not set or removed to prevent activation of the vulnerable endpoint. 3. Implement strict input validation and sanitization for any redirect parameters, enforcing a whitelist of allowed domains or internal paths to prevent open redirects. 4. Educate users and developers about the risks of open redirects and encourage vigilance against suspicious URLs, especially those originating from reflex-based applications. 5. Monitor web application logs for unusual redirect_to parameter usage or unexpected redirection patterns. 6. If upgrading is not immediately possible, consider disabling or restricting access to the /auth-codespace endpoint in production environments. 7. Incorporate Content Security Policy (CSP) headers to restrict navigation to trusted domains, mitigating the impact of malicious redirects. 8. Conduct security reviews of environment variable configurations to avoid accidental exposure of Codespaces-specific variables in production.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-10T14:22:48.205Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efc69b60c3b60ff6f859d3

Added to database: 10/15/2025, 4:06:51 PM

Last enriched: 10/15/2025, 4:09:13 PM

Last updated: 10/15/2025, 7:37:24 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats