Taguette is an open source qualitative research tool. In versions 1.5.1 and below, attackers can craft malicious URLs that redirect users to arbitrary external websites after authentication. The application accepts a user-controlled next parameter and uses it directly in HTTP redirects without any validation. This can be exploited for phishing attacks where victims believe they are interacting with a trusted Taguette instance but are redirected to a malicious site designed to steal credentials or deliver malware. This issue is fixed in version 1.5.2.
References
| Link | Resource |
|---|---|
| https://github.com/remram44/taguette/commit/67de2d2612e7e2572c61cd9627f89c2bfd0f2a36 | Patch |
| https://github.com/remram44/taguette/security/advisories/GHSA-5923-r76v-mprm | Exploit Third Party Advisory |
Configurations
History
16 Dec 2025, 15:11
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/remram44/taguette/commit/67de2d2612e7e2572c61cd9627f89c2bfd0f2a36 - Patch | |
| References | () https://github.com/remram44/taguette/security/advisories/GHSA-5923-r76v-mprm - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:taguette:taguette:*:*:*:*:*:*:*:* | |
| First Time |
Taguette taguette
Taguette |
10 Dec 2025, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 00:16
Updated : 2025-12-16 15:11
NVD link : CVE-2025-67502
Mitre link : CVE-2025-67502
CVE.ORG link : CVE-2025-67502
JSON object : View
Products Affected
taguette
- taguette
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
