-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from insufficient validation of the 'next' parameter in workflow forms. The commit diff shows the vulnerable code in horizon/workflows/views.py's get_context_data method previously set context['REDIRECT_URL'] directly from request.GET without security checks. The patch added validation using django.utils.http.is_safe_url, confirming this was the vulnerable point. The workflow forms' redirect handling is explicitly mentioned in CVE descriptions and commit messages, making this the clear attack vector.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| horizon | pip | < 15.3.2 | 15.3.2 |
| horizon | pip | >= 16.0.0, < 16.2.1 | 16.2.1 |
| horizon | pip | >= 17.0.0, < 18.3.3 | 18.3.3 |
| horizon | pip | >= 18.4.0, < 18.6.0 | 18.6.0 |
Ongoing coverage of React2Shell