Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.
{
"github_reviewed": true,
"github_reviewed_at": "2021-05-20T20:55:39Z",
"nvd_published_at": null,
"severity": "MODERATE",
"cwe_ids": [
"CWE-601"
]
}