CVE-2026-44503: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in microsoft kiota-java
CVE-2026-44503 is a high-severity vulnerability in the microsoft/kiota-java library (versions prior to 1. 9. 1). The RedirectHandler middleware fails to remove sensitive HTTP headers such as Cookie, Proxy-Authorization, and custom headers when following HTTP 3xx redirects to different hosts or schemes, only removing the Authorization header. This behavior can lead to unintended leakage of sensitive information to untrusted redirect targets.
AI Analysis
Technical Summary
The vulnerability exists in the RedirectHandler middleware of microsoft/kiota-java (com.microsoft.kiota:microsoft-kiota-http-okHttp v1.9.0 and earlier). When the client follows HTTP 3xx redirects to a different host or scheme, it strips only the Authorization header but forwards other sensitive headers like Cookie, Proxy-Authorization, and custom headers. This improper handling of headers during redirects can cause sensitive information to be sent to untrusted external sites, constituting an open redirect issue categorized under CWE-601.
Potential Impact
Sensitive HTTP headers beyond Authorization, including Cookie and Proxy-Authorization, may be leaked to untrusted redirect targets during HTTP 3xx redirects. This can expose authentication tokens or session information to potentially malicious sites, increasing the risk of unauthorized access or session hijacking. The CVSS 4.0 score of 7 indicates a high severity with network attack vector, low attack complexity, and partial user interaction required.
Mitigation Recommendations
No official patch or remediation level is currently confirmed for this vulnerability. Users of microsoft/kiota-java versions prior to 1.9.1 should monitor the vendor's advisory for updates and apply any official fixes once available. Until then, avoid following redirects to untrusted hosts or manually inspect and sanitize headers when handling redirects in affected versions.
CVE-2026-44503: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in microsoft kiota-java
Description
CVE-2026-44503 is a high-severity vulnerability in the microsoft/kiota-java library (versions prior to 1. 9. 1). The RedirectHandler middleware fails to remove sensitive HTTP headers such as Cookie, Proxy-Authorization, and custom headers when following HTTP 3xx redirects to different hosts or schemes, only removing the Authorization header. This behavior can lead to unintended leakage of sensitive information to untrusted redirect targets.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability exists in the RedirectHandler middleware of microsoft/kiota-java (com.microsoft.kiota:microsoft-kiota-http-okHttp v1.9.0 and earlier). When the client follows HTTP 3xx redirects to a different host or scheme, it strips only the Authorization header but forwards other sensitive headers like Cookie, Proxy-Authorization, and custom headers. This improper handling of headers during redirects can cause sensitive information to be sent to untrusted external sites, constituting an open redirect issue categorized under CWE-601.
Potential Impact
Sensitive HTTP headers beyond Authorization, including Cookie and Proxy-Authorization, may be leaked to untrusted redirect targets during HTTP 3xx redirects. This can expose authentication tokens or session information to potentially malicious sites, increasing the risk of unauthorized access or session hijacking. The CVSS 4.0 score of 7 indicates a high severity with network attack vector, low attack complexity, and partial user interaction required.
Mitigation Recommendations
No official patch or remediation level is currently confirmed for this vulnerability. Users of microsoft/kiota-java versions prior to 1.9.1 should monitor the vendor's advisory for updates and apply any official fixes once available. Until then, avoid following redirects to untrusted hosts or manually inspect and sanitize headers when handling redirects in affected versions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-05-06T18:28:20.886Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a05f312ec166c07b0f45c9f
Added to database: 5/14/2026, 4:06:42 PM
Last enriched: 5/14/2026, 4:21:37 PM
Last updated: 5/14/2026, 5:15:29 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.