Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @novu/node
  4. ›
  5. CVE-2023-35948

CVE-2023-35948: URL Redirection to Untrusted Site ('Open Redirect')

July 6, 2023 (updated July 12, 2023)

Novu provides an API for sending notifications through multiple channels. Versions prior to 0.16.0 contain an open redirect vulnerability in the “Sign In with GitHub” functionality of Novu’s open-source repository. It could have allowed an attacker to force a victim into opening a malicious URL and thus, potentially log into the repository under the victim’s account gaining full control of the account. This vulnerability only affected the Novu Cloud and Open-Source deployments if the user manually enabled the GitHub OAuth on their self-hosted instance of Novu. Users should upgrade to version 0.16.0 to receive a patch.

References

  • github.com/novuhq/novu/pull/3510
  • github.com/novuhq/novu/security/advisories/GHSA-xxv3-m43w-gv79
  • nvd.nist.gov/vuln/detail/CVE-2023-35948

Code Behaviors & Features

Detect and mitigate CVE-2023-35948 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.16

Fixed versions

  • 0.16

Solution

Upgrade to version 0.16 or above.

Impact 6.1 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

npm/@novu/node/CVE-2023-35948.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.