{"id":"CVE-2023-27292","details":"An open redirect vulnerability exposes OpenCATS to template injection due to improper validation of user-supplied GET parameters.","modified":"2026-04-12T06:37:29.296892Z","published":"2023-02-28T17:15:11.373Z","references":[{"type":"EVIDENCE","url":"https://www.tenable.com/security/research/tra-2023-8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opencats/opencats","events":[{"introduced":"0"},{"last_affected":"2764566bcb37ebde9e87f9106e9defed3d7d7c0c"}],"database_specific":{"cpe":"cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.9.6"}],"source":"CPE_FIELD"}}],"versions":["0.9.1a","0.9.3","0.9.3-1","0.9.3-2","0.9.3-3","0.9.4","0.9.4-1","0.9.4-2","0.9.4-3","0.9.6","delete","opencats-0.9.3","opencats-0.9.3(alpha)","opencats-0.9.3(final)"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-27292.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}