Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2709: Open Redirect in busy

0
Medium
VulnerabilityCVE-2026-2709cvecve-2026-2709
Published: Thu Feb 19 2026 (02/19/2026, 06:32:06 UTC)
Source: CVE Database V5
Product: busy

Description

A flaw has been found in busy up to 2.5.5. The affected element is an unknown function of the file source-code/busy-master/src/server/app.js of the component Callback Handler. Executing a manipulation of the argument state can lead to open redirect. It is possible to launch the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:26:34 UTC

Technical Analysis

CVE-2026-2709 identifies an open redirect vulnerability in the busy project, affecting versions 2.5.0 through 2.5.5. The vulnerability exists in an unknown function within the Callback Handler component located in source-code/busy-master/src/server/app.js. The root cause is insufficient validation or sanitization of the 'state' parameter, which can be manipulated by an attacker to redirect users to arbitrary external URLs. This type of vulnerability is commonly exploited in phishing attacks, where users are tricked into clicking malicious links that appear legitimate but redirect to harmful sites. The vulnerability is remotely exploitable without requiring authentication, but it does require user interaction to trigger the redirect. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), user interaction required (UI:P), and limited impact on confidentiality and integrity, with no impact on availability. The project was notified early but has not yet responded or issued a patch. Public exploits exist, increasing the risk of exploitation in the wild. The lack of a patch and the presence of a public exploit necessitate immediate attention from users of the affected versions.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to conduct phishing attacks by redirecting users to malicious websites that may steal credentials, deliver malware, or perform other social engineering attacks. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks such as session hijacking or credential theft. Organizations relying on busy for web services may face reputational damage and increased risk of user-targeted attacks. Since exploitation requires user interaction, the scope is somewhat limited but still significant, especially in environments with high user traffic or where users are less security-aware. The absence of an official patch increases the window of exposure. Attackers could leverage this vulnerability in targeted campaigns or broad phishing attempts, potentially affecting a wide user base.

Mitigation Recommendations

1. Implement strict validation and sanitization of the 'state' parameter in the Callback Handler to ensure it only allows safe, expected URLs or relative paths. 2. Employ allowlists for redirect URLs to prevent arbitrary external redirects. 3. Use security headers such as Content Security Policy (CSP) and X-Frame-Options to mitigate the impact of redirection-based attacks. 4. Educate users to recognize suspicious URLs and avoid clicking unknown links. 5. Monitor web server logs for unusual redirect patterns or spikes in redirect-related errors. 6. If possible, upgrade to a patched version once available or apply custom patches to fix the validation logic. 7. Consider implementing multi-factor authentication to reduce the risk of session hijacking following phishing. 8. Use web application firewalls (WAFs) to detect and block exploit attempts targeting this vulnerability. 9. Engage with the busy project maintainers or community to encourage timely patch release.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T20:00:57.543Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6996b08a6aea4a407a42042b

Added to database: 2/19/2026, 6:41:14 AM

Last enriched: 2/28/2026, 1:26:34 PM

Last updated: 4/9/2026, 4:34:32 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses