Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2153: Open Redirect in mwielgoszewski doorman

0
Medium
VulnerabilityCVE-2026-2153cvecve-2026-2153
Published: Sun Feb 08 2026 (02/08/2026, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: mwielgoszewski
Product: doorman

Description

CVE-2026-2153 is an open redirect vulnerability in the mwielgoszewski doorman product versions up to 0. 6. The flaw exists in the is_safe_url function within doorman/users/views. py, where manipulation of the 'Next' parameter can redirect users to arbitrary external URLs. This vulnerability can be exploited remotely without authentication but requires user interaction (clicking a crafted link). The CVSS 4. 0 base score is 5. 3, indicating medium severity. While no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. Open redirects can facilitate phishing attacks and bypass security controls by redirecting users to malicious sites.

AI-Powered Analysis

AILast updated: 02/08/2026, 13:30:35 UTC

Technical Analysis

CVE-2026-2153 identifies an open redirect vulnerability in the open-source authentication and access control tool 'doorman' developed by mwielgoszewski, affecting all versions up to 0.6. The vulnerability resides in the is_safe_url function within the doorman/users/views.py file, which is intended to validate URLs passed via the 'Next' parameter to prevent unsafe redirections. However, due to insufficient validation logic, an attacker can craft a URL with a manipulated 'Next' parameter that causes the application to redirect users to arbitrary external websites. This flaw can be exploited remotely without requiring authentication, but it necessitates user interaction, such as clicking a malicious link. The vulnerability's CVSS 4.0 score is 5.3, reflecting medium severity, primarily due to the lack of direct impact on confidentiality, integrity, or availability, but with a potential to facilitate social engineering attacks like phishing. Although no active exploits have been reported in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The open redirect can be leveraged by attackers to bypass security filters, steal user credentials, or distribute malware by redirecting users to malicious domains. The vulnerability affects all released versions from 0.1 through 0.6, and no official patches or fixes have been linked yet, requiring users to implement workarounds or code-level mitigations. Organizations relying on doorman for user authentication or session management should prioritize addressing this issue to prevent exploitation.

Potential Impact

For European organizations, the open redirect vulnerability in doorman poses a moderate risk primarily through social engineering and phishing attacks. Attackers can exploit this flaw to redirect users to malicious websites that may host malware or credential harvesting pages, potentially compromising user accounts and organizational security. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can facilitate broader attacks such as session hijacking or unauthorized access if combined with other vulnerabilities. Organizations that integrate doorman into their authentication workflows or internal portals may see increased phishing risks targeting employees or customers. The impact is heightened in sectors with stringent regulatory requirements for data protection and user privacy, such as finance, healthcare, and government institutions across Europe. Additionally, the remote exploitability without authentication means attackers can target users en masse via phishing campaigns, increasing the threat surface. However, the requirement for user interaction limits automated exploitation, somewhat reducing the overall risk.

Mitigation Recommendations

To mitigate CVE-2026-2153, European organizations using doorman should first check for any official patches or updates from the vendor and apply them promptly once available. In the absence of official fixes, developers should review and strengthen the is_safe_url function to ensure strict validation of the 'Next' parameter, allowing only internal or whitelisted URLs for redirection. Implementing a whitelist-based URL validation or using framework-provided safe redirect utilities is recommended. Additionally, organizations should implement security awareness training to educate users about the risks of clicking suspicious links, especially those involving redirects. Deploying web application firewalls (WAFs) with rules to detect and block suspicious redirect patterns can provide an additional layer of defense. Monitoring logs for unusual redirect requests and anomalous user behavior can help detect exploitation attempts early. Finally, consider adding multi-factor authentication (MFA) to reduce the impact of credential theft resulting from phishing attacks facilitated by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T08:18:21.728Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69888c9f4b57a58fa1909435

Added to database: 2/8/2026, 1:16:15 PM

Last enriched: 2/8/2026, 1:30:35 PM

Last updated: 2/8/2026, 2:31:22 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats