Open redirection vulnerability in the latest demo version of the Cradle eCommerce platform. The vulnerability occurs in the login form endpoint, where the ‘returnUrl’ parameter allows redirection because the web application accepts a URL as a parameter without properly validating it. As a result, it is possible to redirect users from the legitimate website to external pages. An attacker could exploit this vulnerability to deceive users and redirect them from a trusted URL to a malicious one without their knowledge.
Metrics
Affected Vendors & Products
References
History
Fri, 08 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open redirection vulnerability in the latest demo version of the Cradle eCommerce platform. The vulnerability occurs in the login form endpoint, where the ‘returnUrl’ parameter allows redirection because the web application accepts a URL as a parameter without properly validating it. As a result, it is possible to redirect users from the legitimate website to external pages. An attacker could exploit this vulnerability to deceive users and redirect them from a trusted URL to a malicious one without their knowledge. | |
| Title | Multiple vulnerabilities in Cradle e-commerce | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-05-08T11:24:53.064Z
Reserved: 2026-02-27T10:16:09.822Z
Link: CVE-2026-3318
No data.
Status : Received
Published: 2026-05-08T12:16:29.323
Modified: 2026-05-08T12:16:29.323
Link: CVE-2026-3318
No data.
OpenCVE Enrichment
No data.