VYPR
Moderate severityNVD Advisory· Published Nov 18, 2020· Updated Aug 4, 2024

CVE-2020-28724

CVE-2020-28724

Description

Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open redirect in werkzeug <0.11.6 due to double-slash in URL allowing an attacker to craft a malicious redirect.

Root

Cause

CVE-2020-28724 describes an open redirect vulnerability in Werkzeug, a WSGI library underlying Flask. The bug affects versions before 0.11.6 and is triggered by a double slash (//) in the URL path. When the development server handles a request such as http://attacker.com//legitimate-app-path, it incorrectly sets the HTTP_HOST header to the attacker-supplied host, enabling a redirect to an arbitrary external site [1][2].

Attack

Vector

An attacker can exploit this by crafting a URL with a double slash after the host part, for example: http://legitimate-site.com//attacker-controlled-domain. If a user clicks such a link while the application is running on Werkzeug's development server, the server misparses the URL and may redirect the browser to the attacker's domain. The attack does not require authentication because it preys on how the server constructs absolute URLs in redirect responses [2][3].

Impact

Successful exploitation allows an attacker to redirect users to a malicious site, facilitating phishing, credential theft, or malware distribution. Since the redirect appears to originate from the trusted domain, users may be deceived into trusting the target. The vulnerability is specifically in the development server (werkzeug.serving) and does not affect production WSGI servers [2][4].

Mitigation

Upgrading to Werkzeug 0.11.6 or later resolves the issue by properly normalizing URLs with double slashes [3]. Users running applications with older Werkzeug versions should update immediately, especially if the development server is exposed to external traffic. No workaround is documented for unpatched versions [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
werkzeugPyPI
< 0.11.60.11.6

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.