Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1406: Open Redirect in lcg0124 BootDo

0
Medium
VulnerabilityCVE-2026-1406cvecve-2026-1406
Published: Sun Jan 25 2026 (01/25/2026, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: lcg0124
Product: BootDo

Description

CVE-2026-1406 is an open redirect vulnerability in the BootDo product by lcg0124, specifically in the redirectToLogin function of AccessControlFilter. java. This flaw allows remote attackers to manipulate the Hostname argument, causing the application to redirect users to arbitrary external URLs. The vulnerability requires no authentication but does require user interaction to follow the malicious redirect. It has a CVSS 4. 0 base score of 5. 1, indicating medium severity. Exploitation can facilitate phishing attacks or redirect users to malicious sites, potentially leading to credential theft or malware delivery. The product uses a rolling release model, complicating identification of affected versions and patch availability. No known exploits are currently observed in the wild.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:37:30 UTC

Technical Analysis

CVE-2026-1406 identifies an open redirect vulnerability in the BootDo web application framework developed by lcg0124. The vulnerability resides in the redirectToLogin function within AccessControlFilter.java, part of the Host Header Handler component. Specifically, the function improperly handles the Hostname argument, allowing an attacker to manipulate it to redirect users to arbitrary external URLs. This flaw can be exploited remotely without authentication, though it requires user interaction to follow the malicious redirect link. Open redirect vulnerabilities are commonly abused in phishing campaigns to trick users into visiting malicious sites under the guise of a trusted domain. The BootDo product follows a rolling release model, which means updates are continuously delivered without fixed version numbers, making it difficult to pinpoint exact affected versions or patch releases. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges required, user interaction needed, no impact on confidentiality or availability, and low impact on integrity. No public exploits are currently known, but the vulnerability has been publicly disclosed, increasing the risk of future exploitation. The vulnerability primarily facilitates social engineering attacks rather than direct system compromise. Organizations using BootDo in their web infrastructure should assess their exposure and apply mitigations promptly.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks. Attackers can craft URLs that appear to originate from legitimate BootDo-hosted sites but redirect users to malicious domains, potentially leading to credential theft, malware infection, or further exploitation. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a vector for broader attacks. Sectors with high reliance on web applications for customer interaction, such as finance, government, and e-commerce, are particularly at risk. The rolling release model of BootDo complicates patch management, potentially delaying remediation. Additionally, organizations with less mature security awareness programs may be more susceptible to successful phishing campaigns leveraging this flaw. The medium CVSS score reflects the limited direct technical impact but acknowledges the significant indirect risks through user deception.

Mitigation Recommendations

To mitigate CVE-2026-1406, organizations should implement strict validation and sanitization of all redirect URLs within BootDo applications, ensuring only trusted, internal destinations are allowed. Employ an allowlist approach for redirect targets rather than blacklists to prevent bypass. Modify the redirectToLogin function to reject or neutralize any Hostname parameters that do not match expected internal domains. Deploy web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns. Educate users and staff about the risks of clicking on unexpected or suspicious links, emphasizing verification of URLs before interaction. Monitor logs for unusual redirect activity that could indicate exploitation attempts. Engage with the BootDo vendor or community to obtain security updates or patches as they become available, despite the rolling release model. Consider implementing Content Security Policy (CSP) headers to restrict navigation to trusted domains. Finally, conduct regular security assessments and penetration tests focusing on open redirect and related web vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-24T19:20:25.676Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697607244623b1157c802958

Added to database: 1/25/2026, 12:05:56 PM

Last enriched: 2/2/2026, 8:37:30 AM

Last updated: 2/7/2026, 6:19:18 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats