Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3032 articles · 107131 vulns · 38/41 feeds (7d)
← Back to list
6.3
CVE-2024-58342EXPLOITEDPATCHED
xenforo · xenforo

XenForo Open Redirect via getDynamicRedirect

Description

XenForo before 2.2.17 and 2.3.1 allows open redirect via a specially crafted URL. The getDynamicRedirect() function does not adequately validate the redirect target, allowing attackers to redirect users to arbitrary external sites using crafted URLs containing newlines, user credentials, or host mismatches.

Affected Products

VendorProductVersions
xenforoxenforo0, 2.3.0

References

  • https://xenforo.com/community/threads/xenforo-2-2-17-released-security-fix.227797/(vendor-advisory, patch)
  • https://www.vulncheck.com/advisories/xenforo-open-redirect-via-getdynamicredirect(third-party-advisory)

Related News (1 articles)

Tier C
VulDB15h ago
CVE-2024-58342 | XenForo up to 2.2.16/2.3.0 URL getDynamicRedirect redirect
→ No new info (linked only)
CVSS 3.16.3 NONE
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
null
CWECWE-601
PublishedApr 1, 2026
Last enriched15h agov2
Trending Score37
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

NONECVE-2026-35056EXPKEV
XenForo Remote Code Execution via Authenticated Admin
Trending: 83
NONECVE-2025-71282EXP
XenForo Path Disclosure via open_basedir Exceptions
Trending: 46
NONECVE-2026-35057EXP
XenForo Stored Cross-Site Scripting via Structured Text Mentions
Trending: 44
NONECVE-2026-35055EXP
XenForo Cross-Site Scripting via Lightbox in Posts
Trending: 37
NONECVE-2025-71281EXP
XenForo Template Method Call Restriction Bypass
Trending: 37

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 1, 2026
Discovered by ZDM
Apr 1, 2026
Updated: description, severity, activelyExploited, patchAvailable
Apr 1, 2026
Actively Exploited
Apr 1, 2026
Patch Available
Apr 1, 2026

Version History

v2
Last enriched 15h ago
v2Tier C15h ago

Updated severity to HIGH, marked as actively exploited, and corrected the patch availability to null.

descriptionseverityactivelyExploitedpatchAvailable
via VulDB
v116h ago

Initial creation