CVE-2026-28681 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 6, 2026
Internet Routing Registry daemon - Open Redirect & Account Takeover
Published: March 6, 2026Updated: March 6, 2026Remote Exploitable
Overview
Internet Routing Registry daemon 4.4.0 to <4.4.5 and 4.5.0 to <4.5.1 contains an open redirect caused by HTTP Host header manipulation in password reset and account creation, letting attackers hijack accounts via confirmation link, exploit requires victim to open attacker-controlled link.
Severity & Score
Severity: High
CVSS Score: 8.1
Impact
Attackers can take over user accounts and modify RPSL objects, potentially impacting network routing data integrity.
Mitigation
Update to versions 4.4.5 or 4.5.1 or later.
References
- https://github.com/irrdnet/irrd/security/advisories/GHSA-22m3-c7vp-49fj
- https://irrd.readthedocs.io/en/stable/releases/4.4.5
- https://irrd.readthedocs.io/en/stable/releases/4.5.1
- https://github.com/irrdnet/irrd/commit/8408e0f1b9f47eb2f2e712d6153e32194df05fbb
- https://github.com/irrdnet/irrd/commit/cf62df4a49d3891e80b2879d9b324d1af050000c
Related Resources
Details
- CVE ID
- CVE-2026-28681
- Severity
- High
- CVSS Score
- 8.1
- Type
- open_redirect
- Status
- new
CWE
- CWE-601
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N