GHSA-g8mr-fgfg-5qpc

Suggest an improvement
Source
https://github.com/advisories/GHSA-g8mr-fgfg-5qpc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-g8mr-fgfg-5qpc/GHSA-g8mr-fgfg-5qpc.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-g8mr-fgfg-5qpc
Aliases
Published
2025-10-21T15:09:06Z
Modified
2026-01-21T16:35:24.430573Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N CVSS Calculator
Summary
Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic
Details

Summary:

A bypass was discovered in the Koa.js framework affecting its back redirect functionality. In certain circumstances, an attacker can manipulate the Referer header to force a user’s browser to navigate to an external, potentially malicious website. This occurs because the implementation incorrectly treats some specially crafted URLs as safe relative paths. Exploiting this vulnerability could allow attackers to perform phishing, social engineering, or other redirect-based attacks on users of affected applications.

This vulnerability affects the code referenced in GitHub Advisory GHSA-jgmv-j7ww-jx2x (which is tracked as CVE‑2025‑54420).

Details:

The patched code attempts to treat values that startWith('/') as safe relative paths and only perform origin checks for absolute URLs. However, protocol‑relative URLs (those beginning with //host) also start with '/' and therefore match the startsWith('/') branch. A protocol‑relative referrer such as //evil.com with trailing double-slash is treated by the implementation as a safe relative path, but browsers interpret Location: //evil.com as a redirect to https://evil.com (or http:// based on context). This discrepancy allows an attacker to supply Referer: //evil.com and trigger an external redirect - bypassing the intended same‑origin protection.

Proof of concept (PoC):

Affected line of code: https://github.com/koajs/koa/blob/master/lib/response.js#L326 The problematic logic looks like:

<img width="567" height="509" alt="3" src="https://github.com/user-attachments/assets/33de440a-8945-4e5f-9e0a-2011a3999458" />

Request with a protocol‑relative Referer: curl -i -H "Referer: //haymiz.dev" http://127.0.0.1:3000/test

<img width="2072" height="1005" alt="1" src="https://github.com/user-attachments/assets/55c48c79-559d-46aa-8b76-c1d2d3536c8b" />

Vulnerable response will contain: HTTP/1.1 302 Found Location: //haymiz.dev

A browser receiving that Location header navigates to https://haymiz.dev (or http:// depending on context), resulting in an open redirect to an attacker‑controlled host:

<img width="454" height="239" alt="2" src="https://github.com/user-attachments/assets/852ae81a-9f63-49c1-9ce5-72cd96bcea68" />

Recommendation / Patch:

  • Do not treat //host as a safe relative path. Explicitly exclude protocol‑relative values from any relative‑path branch.
  • Normalize the Referer by resolving it with a base (e.g., new URL(rawRef, ctx.href)), then compare resolved.origin (scheme+host+port) to ctx.origin (or ctx.host plus scheme/port) before allowing the redirect.

Impact:

An attacker who can cause a victim to visit a specially crafted link (or inject a request with a controlled Referer) can cause the victim to be redirected to an attacker‑controlled domain. This can be used for phishing, social engineering, or to bypass some protection rules that rely on same‑origin navigation.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2025-10-21T17:15:40Z",
    "severity": "MODERATE",
    "github_reviewed_at": "2025-10-21T15:09:06Z",
    "cwe_ids": [
        "CWE-601"
    ]
}
References

Affected packages

npm / koa

Package

Affected ranges

Type
SEMVER
Events
Introduced
3.0.1
Fixed
3.0.3

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-g8mr-fgfg-5qpc/GHSA-g8mr-fgfg-5qpc.json"

npm / koa

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.16.2
Fixed
2.16.3

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-g8mr-fgfg-5qpc/GHSA-g8mr-fgfg-5qpc.json"