{"id":"CVE-2023-26494","summary":"lorawan-stack has open redirect vulnerability","details":"lorawan-stack is an open source LoRaWAN network server. Prior to version 3.24.1, an open redirect exists on the login page of the lorawan stack server, allowing an attacker to supply a user controlled redirect upon sign in. This issue may allows malicious actors to phish users, as users assume they were redirected to the homepage on login. Version 3.24.1 contains a fix.\n\n","aliases":["GHSA-5fwq-9x7j-2qpg","GO-2024-3044"],"modified":"2026-05-19T03:51:54.086657843Z","published":"2023-04-24T16:05:37.982Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/26xxx/CVE-2023-26494.json","cwe_ids":["CWE-601"]},"references":[{"type":"WEB","url":"https://github.com/TheThingsNetwork/lorawan-stack/blob/ecdef730f176c02f7c9afce98b0457ae64de5bfc/pkg/webui/account/views/login/index.js#L90-L90"},{"type":"WEB","url":"https://github.com/TheThingsNetwork/lorawan-stack/blob/ecdef730f176c02f7c9afce98b0457ae64de5bfc/pkg/webui/account/views/token-login/index.js#L74-L74"},{"type":"WEB","url":"https://github.com/TheThingsNetwork/lorawan-stack/releases/tag/v3.24.1"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/26xxx/CVE-2023-26494.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26494"},{"type":"ADVISORY","url":"https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/"},{"type":"FIX","url":"https://github.com/TheThingsNetwork/lorawan-stack/commit/f06776028bdb3994847fc6067613dc61a2b3559e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/thethingsnetwork/lorawan-stack","events":[{"introduced":"0"},{"fixed":"bd83cb3293fff3e471a0a23a6bee28769ef84f1f"}]}],"versions":["v3.17.0","v3.17.1","v3.16.2","v3.16.1","v3.16.0","v3.15.2","v3.15.1","v3.15.0","v3.14.2","v3.14.1","v3.14.0","v3.13.0","v3.12.0","v3.11.0","v3.11.0-rc2","v3.11.0-rc1","v3.10.0-rc2","v3.10.0-rc1","v3.9.0","v3.9.0-rc1","v3.9.0-rc4","v3.9.0-rc3","v3.9.0-rc2","v3.7.0","v3.7.0-rc2","v3.6.0","v3.6.0-rc1","v3.5.2","v3.5.1","v3.5.0","v3.4.2","v3.4.1","v3.4.0","v3.3.2","v3.3.1","v3.3.0","v3.2.6","v3.2.5","v3.2.4","v3.2.3","v3.2.2","v3.2.1","v3.2.0","v3.1.2","v3.1.1","v3.1.0","v3.0.3","v3.0.2","v3.0.1","v3.0.0","v3.0.0-rc3","v3.0.0-rc2","v3.0.0-rc1","v3.0.0-pre"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-26494.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}