{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "fixed": "3.3.2"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "f0608fb8e420a236199b5bd439cf122769236816"
            },
            {
              "fixed": "6af28521589599b1dbafd6313256229ee9a4fa74"
            }
          ],
          "repo": "https://github.com/dpgaspar/flask-appbuilder",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "Flask-AppBuilder is an application development framework, built on top of Flask. In affected versions if using Flask-AppBuilder OAuth, an attacker can share a carefully crafted URL with a trusted domain for an application built with Flask-AppBuilder, this URL can redirect a user to a malicious site. This is an open redirect vulnerability. To resolve this issue upgrade to Flask-AppBuilder 3.2.2 or above. If upgrading is infeasible users may filter HTTP traffic containing `?next={next-site}` where the `next-site` domain is different from the application you are protecting as a workaround.",
  "id": "CVE-2021-32805",
  "modified": "2026-03-13T21:48:33.834786064Z",
  "published": "2021-09-08T18:15:14.733Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-624f-cqvr-3qw4"
    },
    {
      "type": "FIX",
      "url": "https://github.com/dpgaspar/Flask-AppBuilder/commit/6af28521589599b1dbafd6313256229ee9a4fa74"
    }
  ],
  "related": [
    "GHSA-624f-cqvr-3qw4"
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ]
}