redirect_url is treated as safe when url.Parse(...).IsAbs() is false. Protocol-relative URLs like //ikotaslabs.com have an empty scheme and pass that check, allowing post-login redirects to attacker-controlled sites.
url.Parse("//ikotaslabs.com") => empty Scheme, Host="ikotaslabs.com".IsAbs() returns false for //ikotaslabs.com, so the code treats it as allowed.//ikotaslabs.com to current-origin scheme (e.g. https://ikotaslabs.com), enabling phishing flows after login.http://localhost/login?redirect_url=//ikotaslabs.com https://ikotaslabs.com (or http:// depending on origin).This vulnerability was discovered using the automated vulnerability analysis tools VulScribe and PwnML.
The research and tool development were conducted with support from the MITOU Advanced Program (未踏アドバンスト事業),
administered by the Information-technology Promotion Agency (IPA), Japan.
{
"github_reviewed": true,
"nvd_published_at": "2025-12-11T01:16:00Z",
"github_reviewed_at": "2025-12-10T17:18:37Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-601"
]
}