Vulnerability Description
A vulnerability was determined in mwielgoszewski doorman up to 0.6. This issue affects the function is_safe_url of the file doorman/users/views.py. Executing a manipulation of the argument Next can lead to open redirect. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mwielgoszewski | Doorman | <= 0.6 |
Related Weaknesses (CWE)
References
- https://gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924ExploitThird Party Advisory
- https://vuldb.com/?ctiid.344855Permissions RequiredVDB Entry
- https://vuldb.com/?id.344855Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.748072Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2153?
CVE-2026-2153 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability was determined in mwielgoszewski doorman up to 0.6. This issue affects the function is_safe_url of the file doorman/users/views.py. Executing a manipulation of the argument Next can le...
How severe is CVE-2026-2153?
CVE-2026-2153 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2153?
Check the references section above for vendor advisories and patch information. Affected products include: Mwielgoszewski Doorman.