{"id":"CVE-2020-22840","details":"Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php.","modified":"2026-04-11T20:42:02.391309Z","published":"2021-02-09T14:15:14.903Z","references":[{"type":"ADVISORY","url":"https://github.com/b2evolution/b2evolution/issues/102"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/49554"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/b2evolution/b2evolution","events":[{"introduced":"0"},{"fixed":"c4c3c02c00b937f312676003d820ad72f4813631"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"6.11.6"}],"cpe":"cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["6-9-4","6-9-5","6.0.0-alpha","6.0.0-alpha.1","6.1.2-alpha","6.10.2","6.10.3","6.10.4","6.10.5","6.10.6","6.10.7","6.10.8","6.11.4","6.11.5","6.4.2-beta","6.4.3-beta","6.4.4-beta","6.5.0","6.6.0","6.6.1","6.6.4","6.6.5","6.6.6","6.6.7","6.6.8","6.7.5","6.7.6","6.7.7","6.8.10","6.8.3","6.8.4","6.8.5","6.8.6","6.8.7","6.8.8","6.8.9","6.9.3","6.9.4","6.9.5","6.9.7","v5.2.0-stable"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-22840.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}