An open redirect vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs when a user is redirected to a URL specified by user-controlled input in the 'file' parameter without proper validation or sanitization. This can be exploited by attackers to conduct phishing attacks, distribute malware, and steal user credentials.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00163}

epss

{'score': 0.00159}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00179}

epss

{'score': 0.00163}


Mon, 14 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Binary-husky
Binary-husky gpt Academic
CPEs cpe:2.3:a:binary-husky:gpt_academic:3.83:*:*:*:*:*:*:*
Vendors & Products Binary-husky
Binary-husky gpt Academic

Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description An open redirect vulnerability exists in binary-husky/gpt_academic version 3.83. The vulnerability occurs when a user is redirected to a URL specified by user-controlled input in the 'file' parameter without proper validation or sanitization. This can be exploited by attackers to conduct phishing attacks, distribute malware, and steal user credentials.
Title Open Redirect in binary-husky/gpt_academic
Weaknesses CWE-601
References
Metrics cvssV3_0

{'score': 6.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:09:24.562Z

Updated: 2025-03-20T18:55:20.454Z

Reserved: 2024-11-04T18:17:21.309Z

Link: CVE-2024-10812

cve-icon Vulnrichment

Updated: 2025-03-20T17:51:03.431Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T10:15:19.880

Modified: 2025-07-14T15:00:54.933

Link: CVE-2024-10812

cve-icon Redhat

No data.