Vulnerability Description
AdonisJS HTTP Server is a package for handling HTTP requests in the AdonisJS framework. In @adonisjs/http-server versions prior to 7.8.1 and 8.0.0-next.0 through 8.1.3, and @adonisjs/core versions prior to 7.4.0, the response.redirect().back() method reads the Referer header from the incoming HTTP request and redirects to that URL without validating the host.An attacker who can influence the Referer header can cause the application to redirect users to a malicious external site. This affects all AdonisJS applications that use response.redirect().back() or response.redirect('back'). This issue has been fixed in versions 7.8.1 and 8.2.0 and 7.4.0 of @adonisjs/core.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adonisjs | Http-Server | < 7.8.1 |
| Adonisjs | Core | <= 7.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/adonisjs/http-server/commit/2008fb6cf4f6f1c0ca5797d57def4d93ePatch
- https://github.com/adonisjs/http-server/releases/tag/v7.8.1Release Notes
- https://github.com/adonisjs/http-server/releases/tag/v8.2.0Release Notes
- https://github.com/adonisjs/http-server/security/advisories/GHSA-6qvv-pj99-48qmPatchVendor Advisory
FAQ
What is CVE-2026-40255?
CVE-2026-40255 is a vulnerability with a CVSS score of 6.1 (MEDIUM). AdonisJS HTTP Server is a package for handling HTTP requests in the AdonisJS framework. In @adonisjs/http-server versions prior to 7.8.1 and 8.0.0-next.0 through 8.1.3, and @adonisjs/core versions pri...
How severe is CVE-2026-40255?
CVE-2026-40255 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40255?
Check the references section above for vendor advisories and patch information. Affected products include: Adonisjs Http-Server, Adonisjs Core.