从该网页截图中,可以获取到以下关于漏洞的关键信息: Title: https://github.com/mwielgoszewski/doorman doorman Latest Version (commit 9a9b97c8) Open Redirect Description: The is_safe_url function contains a logic flaw that allows attackers to bypass domain validation using redundant leading slashes (e.g., //////////evil.com). This results in an Open Redirect vulnerability where a user is sent to an external malicious site immediately after a successful login. Source: https://gist.github.com/RazerZ-fighting/39f230feb0e450ae54f0a80c63c5d924 User: RazerZ (UID 88457) Submission: 01/28/2026 09:03 AM (11 days ago) Moderation: 02/07/2026 09:18 AM (10 days later) Status: Accepted VulDB entry: [344855] [mwielgoszewski doorman up to 0.6 doorman/users/views.py is_safe_url Next redirect] Points: 18