Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3049: Open Redirect in horilla-opensource horilla

0
Medium
VulnerabilityCVE-2026-3049cvecve-2026-3049
Published: Tue Feb 24 2026 (02/24/2026, 00:32:11 UTC)
Source: CVE Database V5
Vendor/Project: horilla-opensource
Product: horilla

Description

A vulnerability was detected in horilla-opensource horilla up to 1.0.2. This issue affects the function get of the file horilla_generics/global_search.py of the component Query Parameter Handler. The manipulation of the argument prev_url results in open redirect. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 1.0.3 is capable of addressing this issue. The patch is identified as 730b5a44ff060916780c44a4bdbc8ced70a2cd27. The affected component should be upgraded.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:37:40 UTC

Technical Analysis

CVE-2026-3049 identifies an open redirect vulnerability in the horilla-opensource horilla project, affecting versions 1.0.0 through 1.0.2. The vulnerability exists in the 'get' function within the file horilla_generics/global_search.py, specifically in the handling of the 'prev_url' query parameter. Improper validation or sanitization of this parameter allows attackers to craft URLs that redirect users to arbitrary external sites. Such open redirects can be exploited in phishing campaigns, where users believe they are navigating within a trusted domain but are instead redirected to malicious sites. The vulnerability is remotely exploitable without requiring authentication, though it necessitates user interaction (clicking a crafted link). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) reflects network attack vector, low attack complexity, no privileges or user interaction required for exploitation, and partial impact on integrity. The vendor has released version 1.0.3 which includes a patch (commit 730b5a44ff060916780c44a4bdbc8ced70a2cd27) that properly validates or restricts the 'prev_url' parameter to prevent open redirects. While no known exploits in the wild have been reported yet, the public availability of exploit code increases the likelihood of active exploitation attempts.

Potential Impact

The primary impact of this vulnerability is the potential facilitation of phishing and social engineering attacks. Attackers can leverage the open redirect to craft URLs that appear to originate from a trusted horilla-based application, increasing the likelihood that users will trust and click malicious links. This can lead to credential theft, malware delivery, or redirection to fraudulent websites. Although the vulnerability does not directly compromise system confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more sophisticated attacks. Organizations relying on horilla in customer-facing or internal applications risk reputational damage and potential user data compromise if attackers exploit this flaw. The medium CVSS score reflects the moderate risk, given the ease of exploitation and the potential for indirect harm through phishing.

Mitigation Recommendations

Organizations should immediately upgrade horilla to version 1.0.3 or later, which contains the official patch addressing the open redirect vulnerability. In addition to upgrading, developers should audit any usage of URL redirection parameters within their applications to ensure proper validation, such as allowing only internal URLs or using a whitelist approach. Implementing Content Security Policy (CSP) headers can help mitigate the impact of malicious redirects by restricting the domains to which users can be redirected. Security teams should monitor for suspicious URLs referencing horilla domains in phishing campaigns and educate users about the risks of clicking unexpected links, even if they appear to come from trusted sources. Logging and alerting on unusual redirect patterns can also help detect exploitation attempts. Finally, consider deploying web application firewalls (WAFs) with rules to detect and block open redirect attempts targeting horilla endpoints.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-23T17:41:53.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699cf534be58cf853bf60511

Added to database: 2/24/2026, 12:47:48 AM

Last enriched: 3/3/2026, 8:37:40 PM

Last updated: 4/9/2026, 8:58:19 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses