-
CVSS Score
-The vulnerability stemmed from line 173 in views.py where redirect(request.referrer) was called. The Referer header is user-controlled input and was not validated/sanitized before being used for redirection. The patched version replaced this with a controlled URL from undo_invoice(), confirming the vulnerability was in the original redirect() call using request.referrer. The invoice view function is the clear entry point for this exploit.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| cg | pip | < 60.2.12 | 60.2.12 |