Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.130.1, the project's OIDC redirect handling logic constructs the host and protocol of the final redirect URL based on the X-Forwarded-Host or Host headers and the X-Forwarded-Proto value. In deployments where a reverse proxy forwards client-supplied X-Forwarded-* headers to the origin as-is, or where the origin trusts them without validation, an attacker can inject an arbitrary host and trigger an open redirect that sends users to a malicious domain. This issue has been patched in version 1.130.1.
References
Configurations
No configuration.
History
25 Sep 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lobehub/lobe-chat/security/advisories/GHSA-xph5-278p-26qx - |
25 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-25 14:15
Updated : 2025-09-26 14:32
NVD link : CVE-2025-59426
Mitre link : CVE-2025-59426
CVE.ORG link : CVE-2025-59426
JSON object : View
Products Affected
No product.
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')