CVE-2026-35404 PUBLISHED

Open edX Platform has an Open Redirect in Survey Views via Unvalidated redirect_url Parameter

Assigner: GitHub_M
Reserved: 02.04.2026 Published: 06.04.2026 Updated: 06.04.2026

Open edX Platform enables the authoring and delivery of online learning at any scale. he view_survey endpoint accepts a redirect_url GET parameter that is passed directly to HttpResponseRedirect() without any URL validation. When a non-existent survey name is provided, the server issues an immediate HTTP 302 redirect to the attacker-controlled URL. Additionally, the same unvalidated URL is embedded in a hidden form field and returned in a JSON response after form submission, where client-side JavaScript performs location.href = url. This enables phishing and credential theft attacks against authenticated Open edX users. This vulnerability is fixed with commit 76462f1e5fa9b37d2621ad7ad19514b403908970.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
CVSS Score: 4.7

Product Status

Vendor openedx
Product openedx-platform
Versions
  • Version < 76462f1e5fa9b37d2621ad7ad19514b403908970 is affected

References

Problem Types

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') CWE