Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-2153 β€” AI Deep Analysis Summary

CVSS 4.3 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

**🚨 Open Redirect Vulnerability** in `doorman/users/views.py`'s `is_safe_url` function. 🧨 Attackers can redirect users to malicious sites via `Next` parameter.…

Q2Root Cause? (CWE/Flaw)

**❌ CWE-601: Improper Restriction of Redirects**. πŸ“Œ The `is_safe_url` function fails to validate URLs properly, allowing external redirects. 🧩 Root cause: Insecure URL handling logic.

Q3Who is affected? (Versions/Components)

**⚠️ Affected: doorman project (≀ v0.6)**. πŸ“¦ Component: `users/views.py` in mwielgoszewski's doorman. πŸ“¦ All versions up to 0.6 are vulnerable.

Q4What can hackers do? (Privileges/Data)

**πŸ”“ Hackers can redirect users** to any external site. 🎯 No data theft or privilege escalation. 🎯 Goal: Trick users into visiting phishing pages or fake login forms.

Q5Is exploitation threshold high? (Auth/Config)

**πŸ”“ Low threshold**. 🚫 No auth required. 🧩 Exploitation via crafted `Next` parameter in URL. 🎯 Easy to trigger remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

**βœ… Public PoC exists**. πŸ“Œ Gist link: [https://gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924](https://gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924). 🌐 Exploitation likely in wild.

Q7How to self-check? (Features/Scanning)

**πŸ” Self-check**: πŸ”Ž Look for `is_safe_url` in `views.py`. πŸ§ͺ Test with `?next=https://evil.com`. πŸ“Š Use web scanners (e.g., OWASP ZAP) to detect open redirects.

Q8Is it fixed officially? (Patch/Mitigation)

**πŸ› οΈ No official patch mentioned**. πŸ“Œ Latest commit (9a9b97c8) still vulnerable. πŸ“’ Patch not released as of 2026-02-08. 🚨 No mitigation details in data.

Q9What if no patch? (Workaround)

**πŸ›‘οΈ Workaround**: πŸ›‘ Hardcode allowed domains in `is_safe_url`. 🧱 Reject all external URLs. 🧩 Use a whitelist of trusted domains only.

Q10Is it urgent? (Priority Suggestion)

**⚠️ Medium-Urgent**. πŸ“Š CVSS: 5.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N). 🚨 Not critical, but high-risk for phishing. πŸ“Œ Patch ASAP if possible.