An Open Redirect vulnerability exists in the OAuth callback handler in file onlook/apps/web/client/src/app/auth/callback/route.ts in Onlook web application 0.2.32. The vulnerability occurs because the application trusts the X-Forwarded-Host header value without proper validation when constructing a redirect URL. A remote attacker can send a manipulated X-Forwarded-Host header to redirect an authenticated user to an arbitrary external website under their control, which can be exploited for phishing attacks.
References
| Link | Resource |
|---|---|
| https://blog.soohyun.tech/CVE-2025-63784-Open-Redirect-in-Onlook-27e557175d2e80ac8641fab59dc36021 | Exploit Third Party Advisory |
| https://tossbank.notion.site/Open-Redirect-in-onlook-27e557175d2e80ac8641fab59dc36021 | Broken Link |
Configurations
History
No history.
Information
Published : 2025-11-07 17:15
Updated : 2025-12-08 16:07
NVD link : CVE-2025-63784
Mitre link : CVE-2025-63784
CVE.ORG link : CVE-2025-63784
JSON object : View
Products Affected
onlook
- onlook
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
