Misskey is an open source, federated social media platform.In affected versions missing validation in `NoteCreateService.insertNote`, `ApPersonService.createPerson`, and `ApPersonService.updatePerson` allows an attacker to control the target of any "origin" links (such as the "view on remote instance" banner). Any HTTPS URL can be set, even if it belongs to a different domain than the note / user. Vulnerable Misskey instances will use the unverified URL for several clickable links, allowing an attacker to conduct phishing or other attacks against remote users. This issue has been addressed in version 2024.11.0-alpha.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Use CWE-20, Misskey vendor hub and Misskey product page to widen CVE-2024-52593 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-25306, CVE-2026-28431 and CVE-2025-24897 for nearby disclosures in the same product family.