mirror of
https://github.com/AppFlowy-IO/AppFlowy.git
synced 2026-03-24 12:56:59 +00:00
[GH-ISSUE #8551] Open Redirect on SignUp Page #3896
Labels
No labels
2024
2025
2026
acct mgmt
AI
automation
bug
calendar
ci
CJK
cloud
code-block
collaboration
copy-paste
database
data migration
data sync
deploy
desktop
develop
develop
documentation
duplicate
editor
editor-plugin
emoji
export
files
flutter-only
follow-up
formula
good first issue for devs
good first issue for experienced devs
grid
hacktoberfest
HACKTOBERFEST-ACCEPTED
help wanted
i18n
icons
images
importer
improvements
infra
install
integrations
IR
kanban board
login
look and joy
mentorship
mobile
mobile
needs design
new feature
new feature
non-coding
notes
notifications
onboarding
organization
P0+
permission
platform-linux
platform-mac
platform-windows
plugins
program
pull-request
Q1 25
Q1 26
Q2 24
Q2 25
Q3 24
Q3 25
Q4 24
Q4 25
react
regression
rust
rust
Rust-only
Rust-only
Rust-starter
Rust-starter
self-hosted
shortcuts
side panel
slash-menu
sync v2
table
tablet
task
tauri
templates
tests
themes
translation
v0.5.6
v0.5.8
v0.5.9
v0.6.0
v0.6.1
v0.6.4
v0.6.7
v0.6.8
v0.7.1
v0.7.4
v0.7.4
v0.7.5
v0.7.6
v0.7.7
v0.7.8
v0.8.0
v0.8.4
v0.8.5
v0.8.9
web
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
AppFlowy-IO/AppFlowy#3896
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Devilspo on GitHub (Mar 2, 2026).
Original GitHub issue: https://github.com/AppFlowy-IO/AppFlowy/issues/8551
Bug Description
The SignUp endpoint is vulnerable to an Open Redirect vulnerability.
An attacker can manipulate the redirectTo parameter to redirect users to an arbitrary external domain after signup.
This can be used for phishing attacks and social engineering by abusing the trusted domain.
How to Reproduce
Expected Behavior
The application should validate the redirectTo (or redirect) parameter and ensure that users are only redirected to trusted internal pages after completing the signup process.
Operating System
Windows
AppFlowy Version(s)
https://appflowy.com
Screenshots
Additional Context
This vulnerability allows an attacker to redirect users from a trusted domain to a malicious external website.
Because the malicious link begins with the legitimate domain, users are more likely to trust and click it, significantly increasing the success rate of phishing attacks.
An attacker can use this issue to steal user credentials, distribute malware, or conduct large-scale social engineering campaigns.
The trusted domain reputation may help bypass email security filters and web protection mechanisms.
If combined with authentication flows or token-based mechanisms, this vulnerability could potentially lead to account takeover.
Overall, this issue increases the risk of phishing, brand abuse, and user compromise, posing a significant threat to both users and the organization’s reputation.
@LucasXu0 commented on GitHub (Mar 3, 2026):
Thanks for reporting this. We’re working on a fix.
@Devilspo commented on GitHub (Mar 4, 2026):
Any update
@Arpit934823 commented on GitHub (Mar 6, 2026):
Hi, I'd like to work on this issue.
Could you clarify where the login/signup redirect logic is implemented?
Is it inside this repository or handled by the AppFlowy web service?
@Devilspo commented on GitHub (Mar 10, 2026):
Hi, thank you for the clarification.
I investigated the issue further and found that the vulnerability occurs during the signup process, and it appears to be handled by the AppFlowy web service
@Devilspo commented on GitHub (Mar 15, 2026):
Any update
@Devilspo commented on GitHub (Mar 18, 2026):
Can I disclose this vulnerability?
@annieappflowy commented on GitHub (Mar 19, 2026):
@Devilspo , we have fixed this issue and will release it soon. Thank you!