Open Redirect Affecting google_sign_in package, versions <1.3.0


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-GOOGLESIGNIN-12225346
  • published28 Aug 2025
  • disclosed27 Aug 2025
  • creditParsa Ghorbani

Introduced: 27 Aug 2025

NewCVE-2025-57821  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade google_sign_in to version 1.3.0 or higher.

Overview

google_sign_in is a Sign in (or up) with Google for Rails applications

Affected versions of this package are vulnerable to Open Redirect via the ensure_same_origin function in the redirect_protector.rb file. An attacker can cause users to be redirected to an attacker-controlled origin by injecting a crafted URL, potentially exposing authentication information such as tokens.

Note: This is exploitable if the application is configured to store session information in a session cookie, and the attacker can inject arbitrary data into the session cookie.

Workaround

This vulnerability can be mitigated by explicitly setting SameSite=Lax or SameSite=Strict on the application session cookie.

References

CVSS Base Scores

version 4.0
version 3.1