Skip to content

Open Redirect Vulnerability in Taguette

Moderate severity GitHub Reviewed Published Dec 8, 2025 in remram44/taguette • Updated Dec 10, 2025

Package

piptaguette (pip)

Affected versions

<= 1.5.1

Patched versions

1.5.2

Description

Summary

An Open Redirect vulnerability exists in Taguette that allows attackers to craft malicious URLs that redirect users to arbitrary external websites after authentication. This can be exploited for phishing attacks where victims believe they are interacting with a trusted Taguette instance but are redirected to a malicious site designed to steal credentials or deliver malware.

Severity: Medium to High


Details

The application accepts a user-controlled next parameter and uses it directly in HTTP redirects without any validation. The vulnerable code is located in two places:

Location 1: Login Handler (taguette/web/views.py, lines 140-144)

def_go_to_next(self): next_=self.get_argument('next', '') ifnotnext_: next_=self.reverse_url('index') returnself.redirect(next_) # ← No validation of next_ parameter

This method is called after successful login (line 132) and when an already-logged-in user visits the login page (line 109).

Location 2: Cookies Prompt Handler (taguette/web/views.py, lines 79-85)

defpost(self): self.set_cookie('cookies_accepted', 'yes', dont_check=True) next_=self.get_argument('next', '') ifnotnext_: next_=self.reverse_url('index') returnself.redirect(next_) # ← No validation of next_ parameter

In both cases, if next_ is provided by the user, it is passed directly to self.redirect() without checking whether it points to the same host or is a relative URL.


pic

PoC

Simply replace [your-taguette-instance] with your Taguette server domain and test these URLs in your browser:

Test 1: Cookies Prompt Redirect

https://[your-taguette-instance]/cookies?next=https://google.com 
  1. Open the URL above in your browser
  2. Click "Accept cookies" button
  3. Result: You are redirected to https://google.com (external site)

Test 2: Login Redirect

https://[your-taguette-instance]/login?next=https://google.com 
  1. Open the URL above in your browser
  2. Log in with valid credentials
  3. Result: You are redirected to https://google.com (external site)

Test 3: Already Logged In Redirect

https://[your-taguette-instance]/login?next=https://google.com 
  1. First, log in to Taguette normally
  2. Then open the URL above
  3. Result: You are immediately redirected to https://google.com

Note: We use google.com as a safe external site for testing. In a real attack, this would be a phishing site.


Impact

  • Who is affected: All users of any Taguette instance running in multi-user mode
  • Attack vector: Social engineering / phishing via crafted URLs
  • Exploitability: Trivial - requires only crafting a URL with a malicious next parameter
  • Consequences:
    • Credential theft through phishing
    • Malware distribution
    • Session hijacking
    • Reputation damage to organizations running Taguette instances

The vulnerability is particularly dangerous because:

  1. The login page displayed is completely legitimate, building victim trust
  2. Users have just entered their credentials, making them more likely to enter them again on a fake "session expired" page
  3. The trusted domain in the URL makes the attack more convincing

Recommended Fix

Validate that the next parameter is either a relative URL or points to the same host before redirecting.

Example Fix

Add a validation function:

fromurllib.parseimporturlparsedefis_safe_url(url, host): """Check if URL is safe for redirect (relative or same host)."""ifnoturl: returnFalseparsed=urlparse(url) # Reject protocol-relative URLs (//evil.com)ifurl.startswith('//'): returnFalse# Allow relative URLs (no scheme and no netloc)ifnotparsed.schemeandnotparsed.netloc: returnTrue# Allow same-host URLsreturnparsed.netloc==host

Then update the vulnerable methods:

def_go_to_next(self): next_=self.get_argument('next', '') ifnotnext_ornotis_safe_url(next_, self.request.host): next_=self.reverse_url('index') returnself.redirect(next_)

Apply the same fix to the CookiesPrompt.post() method.


References

@remram44remram44 published to remram44/taguette Dec 8, 2025
Published to the GitHub Advisory Database Dec 9, 2025
Reviewed Dec 9, 2025
Published by the National Vulnerability DatabaseDec 10, 2025
Last updated Dec 10, 2025

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

CVSS v3 base metrics

Attack vector:More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity:More severe for the least complex attacks.
Privileges required:More severe if no privileges are required.
User interaction:More severe when no user interaction is required.
Scope:More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality:More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity:More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability:More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(16th percentile)

Weaknesses

URL Redirection to Untrusted Site ('Open Redirect')

The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. Learn more on MITRE.

CVE ID

CVE-2025-67502

GHSA ID

GHSA-5923-r76v-mprm

Credits

LoadingChecking history
See something to contribute? Suggest improvements for this vulnerability.