Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in horilla-opensource horilla up to 1.0.2. This issue affects the function get of the file horilla_generics/global_search.py of the component Query Parameter Handler. The manipulation of the argument prev_url results in open redirect. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 1.0.3 is capable of addressing this issue. The patch is identified as 730b5a44ff060916780c44a4bdbc8ced70a2cd27. The affected component should be upgraded. | |
| Title | horilla-opensource horilla Query Parameter global_search.py get redirect | |
| First Time appeared |
Horilla
Horilla horilla |
|
| Weaknesses | CWE-601 | |
| CPEs | cpe:2.3:a:horilla:horilla:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Horilla
Horilla horilla |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T00:32:11.210Z
Reserved: 2026-02-23T17:41:53.245Z
Link: CVE-2026-3049
No data.
Status : Received
Published: 2026-02-24T01:16:16.087
Modified: 2026-02-24T01:16:16.087
Link: CVE-2026-3049
No data.
OpenCVE Enrichment
No data.