From 5c98dca8f58c5ad45556560aec79b383483dcb3d Mon Sep 17 00:00:00 2001 From: Daniel Watkins Date: Wed, 13 May 2026 17:30:38 -0400 Subject: [PATCH] Improve GHSA-4h76-926q-wxxw --- .../GHSA-4h76-926q-wxxw.json | 25 +++++++++++++++++-- 1 file changed, 23 insertions(+), 2 deletions(-) diff --git a/advisories/unreviewed/2026/02/GHSA-4h76-926q-wxxw/GHSA-4h76-926q-wxxw.json b/advisories/unreviewed/2026/02/GHSA-4h76-926q-wxxw/GHSA-4h76-926q-wxxw.json index 1858ccf6ca023..0676af5072820 100644 --- a/advisories/unreviewed/2026/02/GHSA-4h76-926q-wxxw/GHSA-4h76-926q-wxxw.json +++ b/advisories/unreviewed/2026/02/GHSA-4h76-926q-wxxw/GHSA-4h76-926q-wxxw.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-4h76-926q-wxxw", - "modified": "2026-02-19T18:31:54Z", + "modified": "2026-02-23T15:32:16Z", "published": "2026-02-19T18:31:54Z", "aliases": [ "CVE-2025-69725" ], + "summary": "Open redirect vulnerability in the RedirectSlashes middleware", "details": "An Open Redirect vulnerability in the go-chi/chi >=5.2.2 RedirectSlashes function allows remote attackers to redirect victim users to malicious websites using the legitimate website domain.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/go-chi/chi/v5" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "5.2.2" + }, + { + "fixed": "5.2.4" + } + ] + } + ] + } + ], "references": [ { "type": "WEB",