modauthopenidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In versions prior to 2.4.9.4, the 3rd-party init SSO functionality of modauthopenidc was reported to be vulnerable to an open redirect attack by supplying a crafted URL in the target_link_uri parameter. A patch in version 2.4.9.4 made it so that the OIDCRedirectURLsAllowed setting must be applied to the target_link_uri parameter. There are no known workarounds aside from upgrading to a patched version.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "35"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "36"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": "cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.4.9.4"
}
],
"source": [
"CPE_FIELD",
"REFERENCES"
]
}"2026-04-11T23:14:35Z"
[
{
"signature_version": "v1",
"digest": {
"function_hash": "255789951588007788344141961223198622431",
"length": 3326.0
},
"id": "CVE-2021-39191-1d53a487",
"signature_type": "Function",
"target": {
"file": "src/mod_auth_openidc.c",
"function": "oidc_handle_discovery_response"
},
"source": "https://github.com/openidc/mod_auth_openidc/commit/03e6bfb446f4e3f27c003d30d6a433e5dd8e2b3d",
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39191.json"