
Cloud Vulnerability DB
A community-led vulnerabilities database
An open redirect vulnerability has been identified in Byaidu PDFMathTranslate version 1.9.9, tracked as CVE-2025-50736. The vulnerability was disclosed on October 30, 2025, and allows attackers to craft malicious URLs that can redirect users to arbitrary external websites through the file parameter in the /gradio_api endpoint (MITRE).
The vulnerability exists in the /gradio_api endpoint of Byaidu PDFMathTranslate v1.9.9, where improper validation of the file parameter allows for URL redirection. This open redirect flaw could enable attackers to craft specially formatted URLs that bypass the application's intended redirect restrictions (MITRE).
The vulnerability could be exploited for phishing attacks by redirecting users to malicious websites and potentially bypassing security filters. This could lead to users unknowingly visiting malicious domains while believing they are accessing legitimate resources (MITRE).
No official patches or mitigations have been publicly announced at this time. Organizations using Byaidu PDFMathTranslate v1.9.9 should monitor for updates and consider implementing additional URL validation at the application level (MITRE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."