{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T15:09:25.502","vulnerabilities":[{"cve":{"id":"CVE-2025-8129","sourceIdentifier":"cna@vuldb.com","published":"2025-07-25T05:15:36.980","lastModified":"2025-09-17T14:38:37.743","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in KoaJS Koa up to 3.0.0. Affected is the function back in the library lib/response.js of the component HTTP Header Handler. The manipulation of the argument Referrer leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"es","value":"Se encontró una vulnerabilidad clasificada como problemática en KoaJS (hasta la versión 3.0.0). La función afectada se encuentra en la librería lib/response.js del componente HTTP Header Handler. La manipulación del argumento Referrer provoca una redirección abierta. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado."}],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:*:*:*:*:*:node.js:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.16.2","matchCriteriaId":"A9F36937-D73F-442F-97E3-E57E6B4DD579"},{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:3.0.0:-:*:*:*:node.js:*:*","matchCriteriaId":"829BF63A-A53D-4B0B-9E79-9654AE97D713"},{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:3.0.0:alpha0:*:*:*:node.js:*:*","matchCriteriaId":"C939FF76-3FDC-4439-8794-4DFC390B6AE5"},{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:3.0.0:alpha1:*:*:*:node.js:*:*","matchCriteriaId":"6C0F27D9-2CCD-4CA4-BB80-3650CA1CC7D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:3.0.0:alpha2:*:*:*:node.js:*:*","matchCriteriaId":"AC7C1D95-EC40-445D-A46D-5B52C771E9EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:3.0.0:alpha3:*:*:*:node.js:*:*","matchCriteriaId":"1CB59D3F-CD0C-46FB-92E6-A57B5309690E"},{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:3.0.0:alpha4:*:*:*:node.js:*:*","matchCriteriaId":"7A156C47-5619-4AF3-B7F2-9BE83A5F8F15"},{"vulnerable":true,"criteria":"cpe:2.3:a:koajs:koa:3.0.0:alpha5:*:*:*:node.js:*:*","matchCriteriaId":"0E020A81-C019-45A9-BA3D-0F3C83D1288A"}]}]}],"references":[{"url":"https://github.com/koajs/koa/issues/1892","source":"cna@vuldb.com","tags":["Exploit","Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://github.com/koajs/koa/issues/1892#issue-3213028583","source":"cna@vuldb.com","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory","Vendor Advisory"]},{"url":"https://vuldb.com/?ctiid.317514","source":"cna@vuldb.com","tags":["Permissions Required","VDB Entry"]},{"url":"https://vuldb.com/?id.317514","source":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://vuldb.com/?submit.619741","source":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://github.com/koajs/koa/issues/1892","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Issue Tracking","Patch","Vendor Advisory"]}]}}]}