{"id":"CVE-2023-22298","details":"Open redirect vulnerability in pgAdmin 4 versions prior to v6.14 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.","aliases":["GHSA-894c-rg7f-3c62"],"modified":"2026-02-04T18:20:30.824828Z","published":"2023-01-17T10:15:11.657Z","related":["SUSE-SU-2023:1739-1","openSUSE-SU-2024:13667-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHY2B25YHIIFQ3G44TR7NNEST7FJGJPH/"},{"type":"ADVISORY","url":"https://github.com/pgadmin-org/pgadmin4"},{"type":"ADVISORY","url":"https://github.com/pgadmin-org/pgadmin4/issues/5343"},{"type":"ADVISORY","url":"https://jvn.jp/en/jp/JVN03832974/index.html"},{"type":"ADVISORY","url":"https://www.pgadmin.org/"},{"type":"FIX","url":"https://github.com/pgadmin-org/pgadmin4/issues/5343"},{"type":"PACKAGE","url":"https://github.com/pgadmin-org/pgadmin4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pgadmin-org/pgadmin4","events":[{"introduced":"6d0c4bc116fd16a3e43e498b8fc583046c230e85"},{"fixed":"4d9dfe7d041be8730d7beda94311566d7267cb33"}]}],"versions":["REL-4_0","REL-4_1","REL-4_10","REL-4_11","REL-4_12","REL-4_13","REL-4_14","REL-4_15","REL-4_16","REL-4_17","REL-4_18","REL-4_19","REL-4_2","REL-4_20","REL-4_21","REL-4_22","REL-4_23","REL-4_24","REL-4_25","REL-4_26","REL-4_27","REL-4_28","REL-4_29","REL-4_3","REL-4_30","REL-4_4","REL-4_5","REL-4_6","REL-4_7","REL-4_8","REL-4_9","REL-5_0","REL-5_1","REL-5_2","REL-5_3","REL-5_4","REL-5_5","REL-5_6","REL-5_7","REL-6_0","REL-6_1","REL-6_10","REL-6_11","REL-6_12","REL-6_13","REL-6_2","REL-6_3","REL-6_4","REL-6_5","REL-6_6","REL-6_7","REL-6_8","REL-6_9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-22298.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}