Medium severity4.3NVD Advisory· Published Feb 8, 2026· Updated Apr 29, 2026
CVE-2026-2153
CVE-2026-2153
Description
A vulnerability was determined in mwielgoszewski doorman up to 0.6. This issue affects the function is_safe_url of the file doorman/users/views.py. Executing a manipulation of the argument Next can lead to open redirect. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- gist.github.com/RacerZ-fighting/39f230feb0e450ae54f0a80c63c5d924nvdExploitThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
1- Great responsibility, without great powerCisco Talos Intelligence · Apr 30, 2026