Home

Description

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.8.3, an open redirect vulnerability exists in the OpenCTI platform's SAML authentication endpoint (/auth/saml/callback). By manipulating the RelayState parameter, an attacker can force the server to issue a 302 redirect to any external URL, enabling phishing, credential theft, and arbitrary site redirection. This issue has been patched in version 6.8.3.

PUBLISHED Reserved 2025-09-30 | Published 2026-01-07 | Updated 2026-01-07 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 6.8.3
affected

References

github.com/...pencti/security/advisories/GHSA-jc3f-c62g-v7qw

github.com/...ommit/f755165a26888925c4a58018f7238ff92a0bd378

github.com/OpenCTI-Platform/opencti/releases/tag/6.8.3

cve.org (CVE-2025-61782)

nvd.nist.gov (CVE-2025-61782)

Download JSON