-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability explicitly exists in the logout endpoint's redirection logic. While the exact code isn't shown, the advisory states that other endpoints performed proper validation (checking HTTPS and associated domains) while the logout handler did not. The patch commit title ('logout redirection validation') and CWE-601 context indicate the vulnerable function is the logout handler responsible for processing redirect parameters. In Go web applications, this would typically be a handler function named HandleLogout in a handlers package dealing with logout requests.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/authelia/authelia/v4 | go | < 4.28.0 | 4.28.0 |