Follow Redirects improperly handles URLs in the url.parse() function
- Severity:
- Medium
Description
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname.
Recommendation
Update the follow-redirects package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.15.4
- Patched version(s): 1.15.4
References
- GHSA-jchw-25xp-jwwc
- security.snyk.io
- lists.fedoraproject.org
- security.netapp.com
- CVE-2023-26159
- CWE-20
- CWE-601
- CAPEC-310
- OWASP 2021-A1
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Exposure of Sensitive Information to an Unauthorized Actor in nanoid - CVE-2021-23566
- Redwood is vulnerable to account takeover via dbAuth "forgot-password - Vulnerability
- Strapi Allows Unauthorized Access to Private Fields via parms.lookup - CVE-2024-56143
- Vite has an `server.fs.deny` bypass with an invalid `request-target` - CVE-2025-32395
- Tags:
- npm
- follow-redirects
Anything's wrong? Let us know Last updated on November 04, 2025