
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
The RedirectSlashes function in middleware/strip.go of the go-chi/chi package (versions <= 5.2.1) contains a host header injection vulnerability that leads to open redirect (GHSA-vrw8-fxc6-2r93). This moderate severity vulnerability was discovered and reported by Anuraag Baishya, and was published on June 20, 2025. The issue affects the Go module github.com/go-chi/chi/v5 and has been patched in version 5.2.2 (GitHub Advisory).
The vulnerability stems from the RedirectSlashes method using the Host header to construct the redirectURL, allowing attackers to manipulate the Host header to any arbitrary host. The vulnerability has a CVSS v4 score of 5.1 (Moderate) with the following metrics: Network attack vector, Low attack complexity, No attack requirements, No privileges required, and Active user interaction. The vulnerability is tracked as CWE-601 and requires the manipulation of the Host header for exploitation (GitHub Advisory).
The open redirect vulnerability enables attackers to redirect users to malicious websites. While considered lower-severity as it cannot be exploited directly from browsers or email clients (requiring Host header manipulation), it can still facilitate phishing attacks, credential theft, and malware distribution. The vulnerability is particularly concerning because users may trust the application's domain while being redirected to harmful sites (GitHub Advisory).
The recommended mitigation is to use r.RequestURI instead of r.Host by default, as the RedirectSlashes function is primarily intended for redirects within the same application. For cases requiring redirection to different hosts, a flag can be added to explicitly enable Host header usage, allowing developers to make informed decisions about allowing redirects to arbitrary hosts. The vulnerability has been patched in version 5.2.2 (GitHub Advisory, Chi Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”