CVE-2026-3049: Open Redirect in horilla-opensource horilla
A vulnerability was detected in horilla-opensource horilla up to 1.0.2. This issue affects the function get of the file horilla_generics/global_search.py of the component Query Parameter Handler. The manipulation of the argument prev_url results in open redirect. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 1.0.3 is capable of addressing this issue. The patch is identified as 730b5a44ff060916780c44a4bdbc8ced70a2cd27. The affected component should be upgraded.
AI Analysis
Technical Summary
CVE-2026-3049 identifies an open redirect vulnerability in the horilla-opensource horilla project, affecting versions 1.0.0 through 1.0.2. The vulnerability exists in the 'get' function within the file horilla_generics/global_search.py, specifically in the handling of the 'prev_url' query parameter. Improper validation or sanitization of this parameter allows attackers to craft URLs that redirect users to arbitrary external sites. Such open redirects can be exploited in phishing campaigns, where users believe they are navigating within a trusted domain but are instead redirected to malicious sites. The vulnerability is remotely exploitable without requiring authentication, though it necessitates user interaction (clicking a crafted link). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) reflects network attack vector, low attack complexity, no privileges or user interaction required for exploitation, and partial impact on integrity. The vendor has released version 1.0.3 which includes a patch (commit 730b5a44ff060916780c44a4bdbc8ced70a2cd27) that properly validates or restricts the 'prev_url' parameter to prevent open redirects. While no known exploits in the wild have been reported yet, the public availability of exploit code increases the likelihood of active exploitation attempts.
Potential Impact
The primary impact of this vulnerability is the potential facilitation of phishing and social engineering attacks. Attackers can leverage the open redirect to craft URLs that appear to originate from a trusted horilla-based application, increasing the likelihood that users will trust and click malicious links. This can lead to credential theft, malware delivery, or redirection to fraudulent websites. Although the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more sophisticated attacks. Organizations relying on horilla in customer-facing or internal applications risk reputational damage and potential user data compromise if attackers exploit this flaw. The medium CVSS score reflects the moderate risk, given the ease of exploitation and the potential for indirect harm through phishing.
Mitigation Recommendations
Organizations should immediately upgrade horilla to version 1.0.3 or later, which contains the official patch addressing the open redirect vulnerability. In addition to upgrading, developers should audit any usage of URL redirection parameters within their applications to ensure proper validation, such as allowing only internal URLs or using a whitelist approach. Implementing Content Security Policy (CSP) headers can help mitigate the impact of malicious redirects by restricting the domains to which users can be redirected. Security teams should monitor for suspicious URLs referencing horilla domains in phishing campaigns and educate users about the risks of clicking unexpected links, even if they appear to come from trusted sources. Logging and alerting on unusual redirect patterns can also help detect exploitation attempts. Finally, consider deploying web application firewalls (WAFs) with rules to detect and block open redirect attempts targeting horilla endpoints.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, India, Japan, South Korea
CVE-2026-3049: Open Redirect in horilla-opensource horilla
Description
A vulnerability was detected in horilla-opensource horilla up to 1.0.2. This issue affects the function get of the file horilla_generics/global_search.py of the component Query Parameter Handler. The manipulation of the argument prev_url results in open redirect. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 1.0.3 is capable of addressing this issue. The patch is identified as 730b5a44ff060916780c44a4bdbc8ced70a2cd27. The affected component should be upgraded.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3049 identifies an open redirect vulnerability in the horilla-opensource horilla project, affecting versions 1.0.0 through 1.0.2. The vulnerability exists in the 'get' function within the file horilla_generics/global_search.py, specifically in the handling of the 'prev_url' query parameter. Improper validation or sanitization of this parameter allows attackers to craft URLs that redirect users to arbitrary external sites. Such open redirects can be exploited in phishing campaigns, where users believe they are navigating within a trusted domain but are instead redirected to malicious sites. The vulnerability is remotely exploitable without requiring authentication, though it necessitates user interaction (clicking a crafted link). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) reflects network attack vector, low attack complexity, no privileges or user interaction required for exploitation, and partial impact on integrity. The vendor has released version 1.0.3 which includes a patch (commit 730b5a44ff060916780c44a4bdbc8ced70a2cd27) that properly validates or restricts the 'prev_url' parameter to prevent open redirects. While no known exploits in the wild have been reported yet, the public availability of exploit code increases the likelihood of active exploitation attempts.
Potential Impact
The primary impact of this vulnerability is the potential facilitation of phishing and social engineering attacks. Attackers can leverage the open redirect to craft URLs that appear to originate from a trusted horilla-based application, increasing the likelihood that users will trust and click malicious links. This can lead to credential theft, malware delivery, or redirection to fraudulent websites. Although the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more sophisticated attacks. Organizations relying on horilla in customer-facing or internal applications risk reputational damage and potential user data compromise if attackers exploit this flaw. The medium CVSS score reflects the moderate risk, given the ease of exploitation and the potential for indirect harm through phishing.
Mitigation Recommendations
Organizations should immediately upgrade horilla to version 1.0.3 or later, which contains the official patch addressing the open redirect vulnerability. In addition to upgrading, developers should audit any usage of URL redirection parameters within their applications to ensure proper validation, such as allowing only internal URLs or using a whitelist approach. Implementing Content Security Policy (CSP) headers can help mitigate the impact of malicious redirects by restricting the domains to which users can be redirected. Security teams should monitor for suspicious URLs referencing horilla domains in phishing campaigns and educate users about the risks of clicking unexpected links, even if they appear to come from trusted sources. Logging and alerting on unusual redirect patterns can also help detect exploitation attempts. Finally, consider deploying web application firewalls (WAFs) with rules to detect and block open redirect attempts targeting horilla endpoints.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-23T17:41:53.245Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699cf534be58cf853bf60511
Added to database: 2/24/2026, 12:47:48 AM
Last enriched: 3/3/2026, 8:37:40 PM
Last updated: 4/9/2026, 8:58:19 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.