CVE-2025-62595

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-62595
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-62595.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-62595
Aliases
Published
2025-10-21T16:20:43.809Z
Modified
2025-12-02T20:17:17.682165Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic
Details

Koa is expressive middleware for Node.js using ES2017 async functions. In versions 2.16.2 to before 2.16.3 and 3.0.1 to before 3.0.3, a bypass to CVE-2025-8129 was discovered in the Koa.js framework affecting its back redirect functionality. In certain circumstances, an attacker can manipulate the Referer header to force a user’s browser to navigate to an external, potentially malicious website. This occurs because the implementation incorrectly treats some specially crafted URLs as safe relative paths. Exploiting this vulnerability could allow attackers to perform phishing, social engineering, or other redirect-based attacks on users of affected applications. This issue has been patched in version 3.0.3.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/62xxx/CVE-2025-62595.json",
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

Git / github.com/koajs/koa

Affected ranges

Type
GIT
Repo
https://github.com/koajs/koa
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.16.2"
        },
        {
            "fixed": "2.16.3"
        }
    ]
}
Type
GIT
Repo
https://github.com/koajs/koa
Events
Database specific
{
    "versions": [
        {
            "introduced": "3.0.1"
        },
        {
            "fixed": "3.0.3"
        }
    ]
}

Affected versions

v2.*

v2.16.2

v3.*

v3.0.1
v3.0.2

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-62595.json"