CVE-2025-61782 Overview
CVE-2025-61782 is an open redirect vulnerability affecting the OpenCTI platform, an open source solution for managing cyber threat intelligence knowledge and observables. The vulnerability exists in the SAML authentication endpoint (/auth/saml/callback) where improper validation of the RelayState parameter allows attackers to redirect authenticated users to arbitrary external URLs. By manipulating this parameter, an attacker can force the server to issue a 302 redirect, enabling phishing attacks, credential theft, and arbitrary site redirection.
Critical Impact
Attackers can exploit this vulnerability to redirect users to malicious sites after SAML authentication, enabling phishing campaigns and potential credential theft through look-alike login pages.
Affected Products
- OpenCTI Platform versions prior to 6.8.3
- SAML-enabled OpenCTI deployments
- Organizations using federated authentication with OpenCTI
Discovery Timeline
- January 7, 2026 - CVE-2025-61782 published to NVD
- January 8, 2026 - Last updated in NVD database
Technical Details for CVE-2025-61782
Vulnerability Analysis
This open redirect vulnerability (CWE-601) stems from insufficient validation of the RelayState parameter in the SAML authentication callback endpoint. The RelayState parameter is a standard SAML component that preserves the original destination URL during the authentication flow. In vulnerable versions of OpenCTI, this parameter was not properly validated to ensure it pointed to a legitimate internal URL, allowing attackers to inject arbitrary external URLs.
When a user completes SAML authentication, the application blindly trusts the RelayState value and issues a 302 HTTP redirect to whatever URL is specified. This creates a trusted redirect chain that attackers can abuse for phishing attacks, as victims believe they are interacting with the legitimate OpenCTI platform.
Root Cause
The root cause is improper URL validation in the SAML callback handler. The application failed to implement proper verification of the RelayState parameter and referer headers, allowing external URLs to be accepted as valid redirect targets. The security patch introduced improved RelayState and referer verification by comparing redirect destinations against the application's base URL.
Attack Vector
The attack leverages the network-accessible SAML authentication endpoint and requires user interaction. An attacker crafts a malicious SAML authentication request with a manipulated RelayState parameter pointing to an attacker-controlled domain. The attack flow is as follows:
- Attacker constructs a URL to the OpenCTI SAML endpoint with a malicious RelayState value
- Victim clicks the link and authenticates normally via their identity provider
- After successful authentication, OpenCTI issues a 302 redirect to the attacker's URL
- Victim lands on a phishing page that may harvest credentials or deliver malware
import rateLimit from 'express-rate-limit';
import contentDisposition from 'content-disposition';
import { printSchema } from 'graphql/utilities';
-import { basePath, DEV_MODE, ENABLED_UI, logApp, OPENCTI_SESSION, PLATFORM_VERSION, AUTH_PAYLOAD_BODY_SIZE } from '../config/conf';
+import { basePath, DEV_MODE, ENABLED_UI, logApp, OPENCTI_SESSION, PLATFORM_VERSION, AUTH_PAYLOAD_BODY_SIZE, getBaseUrl } from '../config/conf';
import passport, { isStrategyActivated, STRATEGY_CERT } from '../config/providers';
import { HEADERS_AUTHENTICATORS, loginFromProvider, sessionAuthenticateUser, userWithOrigin } from '../domain/user';
import { downloadFile, getFileContent, isStorageAlive, loadFile } from '../database/file-storage';
Source: GitHub Commit Details
The patch imports getBaseUrl from the configuration module, which is then used to validate that redirect destinations match the expected base URL of the OpenCTI instance, preventing redirects to external domains.
Detection Methods for CVE-2025-61782
Indicators of Compromise
- HTTP requests to /auth/saml/callback with RelayState parameters containing external URLs
- 302 redirects from the SAML callback endpoint to domains outside the organization
- Unusual authentication patterns followed by redirects to unknown domains
- User reports of being redirected to unexpected sites after SAML login
Detection Strategies
- Monitor web application firewall (WAF) logs for SAML callback requests with suspicious RelayState values
- Implement URL allowlisting rules to detect RelayState parameters pointing to non-internal domains
- Configure SIEM alerts for 302 responses from /auth/saml/callback to external domains
- Review authentication logs for patterns indicating redirect abuse
Monitoring Recommendations
- Enable verbose logging on the OpenCTI SAML authentication endpoints
- Set up network traffic analysis to detect redirects to newly registered or suspicious domains
- Monitor for phishing reports that may indicate exploitation of this vulnerability
- Track failed login attempts on external sites that may be leveraging stolen session data
How to Mitigate CVE-2025-61782
Immediate Actions Required
- Upgrade OpenCTI to version 6.8.3 or later immediately
- Audit authentication logs for any suspicious redirect patterns prior to patching
- Notify users about potential phishing attempts if exploitation is suspected
- Consider temporarily disabling SAML authentication until patching is complete
Patch Information
OpenCTI has released version 6.8.3 which addresses this vulnerability. The patch implements improved RelayState and referer verification to ensure redirect destinations are validated against the application's base URL. Organizations should upgrade immediately.
For detailed patch information, see the GitHub Release 6.8.3 and the GitHub Security Advisory GHSA-jc3f-c62g-v7qw.
Workarounds
- Implement WAF rules to block SAML callback requests with external URLs in the RelayState parameter
- Configure Content Security Policy (CSP) headers to restrict redirect destinations
- Deploy a reverse proxy with URL validation for the /auth/saml/callback endpoint
- Train users to verify URLs after authentication and report suspicious redirects
# Example WAF rule to block external RelayState values (ModSecurity syntax)
SecRule ARGS:RelayState "^https?://(?!your-opencti-domain\.com)" \
"id:100001,phase:2,deny,status:403,msg:'Blocked suspicious SAML RelayState redirect'"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


