Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3049: Open Redirect in horilla-opensource horilla

0
Medium
VulnerabilityCVE-2026-3049cvecve-2026-3049
Published: Tue Feb 24 2026 (02/24/2026, 00:32:11 UTC)
Source: CVE Database V5
Vendor/Project: horilla-opensource
Product: horilla

Description

CVE-2026-3049 is an open redirect vulnerability in horilla-opensource horilla versions up to 1. 0. 2, specifically in the get function of horilla_generics/global_search. py. The vulnerability arises from improper handling of the 'prev_url' query parameter, allowing attackers to redirect users to arbitrary external URLs. This flaw can be exploited remotely without authentication but requires user interaction to trigger the redirect. The vulnerability has a CVSS 4. 0 base score of 5. 3, indicating medium severity. Exploits are publicly available, though no widespread attacks have been reported yet.

AI-Powered Analysis

AILast updated: 02/24/2026, 01:01:52 UTC

Technical Analysis

CVE-2026-3049 identifies an open redirect vulnerability in the horilla-opensource horilla product, affecting versions 1.0.0 through 1.0.2. The vulnerability is located in the get function within the file horilla_generics/global_search.py, specifically in the Query Parameter Handler component. The issue stems from insufficient validation or sanitization of the 'prev_url' query parameter, which an attacker can manipulate to redirect users to arbitrary external websites. This type of vulnerability can be exploited remotely without requiring authentication, but it necessitates user interaction, such as clicking a crafted link. The open redirect can facilitate phishing attacks by making malicious URLs appear legitimate, potentially leading to credential theft or malware distribution. The vulnerability has been assigned a CVSS 4.0 score of 5.3, reflecting a medium severity level due to its ease of exploitation and impact on user trust and security. The vendor has addressed this issue in version 1.0.3 by implementing proper validation or sanitization of the 'prev_url' parameter. The patch is identified by commit 730b5a44ff060916780c44a4bdbc8ced70a2cd27. Although no known exploits in the wild have been reported, the public availability of exploit code increases the risk of attacks. Organizations using horilla should upgrade promptly to prevent exploitation.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to redirect users to malicious websites, which can lead to phishing, social engineering, or malware distribution campaigns. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks. Organizations relying on horilla for web services may face reputational damage if users are redirected to harmful sites. Additionally, attackers could exploit this vulnerability to bypass security filters or to craft convincing phishing URLs that appear to originate from trusted horilla-hosted domains. The medium CVSS score reflects the moderate risk posed by this vulnerability, especially in environments with high user interaction or sensitive data. The scope of affected systems includes all deployments running horilla versions 1.0.0 to 1.0.2, potentially impacting organizations globally that utilize this software.

Mitigation Recommendations

To mitigate CVE-2026-3049, organizations should immediately upgrade horilla to version 1.0.3 or later, where the vulnerability has been patched. In addition to upgrading, administrators should audit web application logs for suspicious redirect attempts and monitor user reports of unexpected redirects. Implementing web application firewall (WAF) rules to detect and block requests with suspicious 'prev_url' parameters can provide temporary protection. Security teams should educate users about the risks of clicking on unexpected links, especially those that appear to redirect through trusted domains. Developers maintaining forks or custom versions of horilla should review and apply the patch identified by commit 730b5a44ff060916780c44a4bdbc8ced70a2cd27 to ensure proper validation of redirect parameters. Finally, organizations should conduct regular security assessments to identify similar open redirect vulnerabilities in other components or third-party software.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-23T17:41:53.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf534be58cf853bf60511

Added to database: 2/24/2026, 12:47:48 AM

Last enriched: 2/24/2026, 1:01:52 AM

Last updated: 2/24/2026, 4:13:53 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats