Follow Redirects improperly handles URLs in the url.parse() function
- Severity:
- Medium
Description
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname.
Recommendation
Update the follow-redirects package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.15.4
- Patched version(s): 1.15.4
References
- GHSA-jchw-25xp-jwwc
- security.snyk.io
- lists.fedoraproject.org
- security.netapp.com
- CVE-2023-26159
- CWE-20
- CWE-601
- CAPEC-310
- OWASP 2021-A1
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- url-parse Incorrectly parses URLs that include an '@ - CVE-2022-0639
- follow-redirects' Proxy-Authorization header kept across hosts - CVE-2024-28849
- Exposure of sensitive information in follow-redirects - CVE-2022-0155
- Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects - CVE-2022-0536
- Tags:
- npm
- follow-redirects
Anything's wrong? Let us know Last updated on November 04, 2025