
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was found in Macaron i18n affecting versions prior to 0.5.0. The vulnerability exists in the i18n.go file and has been classified as an open redirect issue. The vulnerability was assigned CVE-2020-36627 and was disclosed on December 25, 2022 (NVD).
The vulnerability stems from improper validation in the i18n.go file where the manipulation of certain parameters can lead to an open redirect condition. The CVSS v3.1 base score is 6.1 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating that the vulnerability can be exploited remotely without requiring privileges but does need user interaction (NVD).
If exploited, this vulnerability could allow an attacker to redirect users to untrusted sites. This could potentially be used in phishing attacks or to direct users to malicious websites, leading to possible information disclosure or further compromise (NVD).
The vulnerability has been fixed in version 0.5.0 of Macaron i18n. The patch is identified by commit 329b0c4844cc16a5a253c011b55180598e707735. Users are recommended to upgrade to the fixed version to address this security issue (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."