CVE-2025-61782: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in OpenCTI-Platform opencti
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.8.3, an open redirect vulnerability exists in the OpenCTI platform's SAML authentication endpoint (/auth/saml/callback). By manipulating the RelayState parameter, an attacker can force the server to issue a 302 redirect to any external URL, enabling phishing, credential theft, and arbitrary site redirection. This issue has been patched in version 6.8.3.
AI Analysis
Technical Summary
CVE-2025-61782 is an open redirect vulnerability classified under CWE-601 found in the OpenCTI platform, an open-source cyber threat intelligence management tool. The flaw exists in the SAML authentication endpoint (/auth/saml/callback) prior to version 6.8.3. Specifically, the vulnerability arises from improper validation of the RelayState parameter, which is intended to preserve state information during SAML authentication flows. An attacker can craft a malicious URL that manipulates this parameter to redirect authenticated or unauthenticated users to arbitrary external websites. This redirection can be exploited to conduct phishing attacks, steal credentials, or redirect users to malicious sites, potentially leading to further compromise. The vulnerability does not require any privileges or authentication but does require user interaction to follow the malicious link. The CVSS v3.1 base score is 5.4, reflecting medium severity, with attack vector as network, low attack complexity, no privileges required, user interaction required, and limited impact on confidentiality and integrity but no impact on availability. No known exploits have been reported in the wild as of the publication date. The issue was resolved in OpenCTI version 6.8.3 by properly validating or restricting the RelayState parameter to prevent arbitrary redirection.
Potential Impact
For European organizations using OpenCTI versions prior to 6.8.3, this vulnerability poses a moderate risk. Successful exploitation can lead to phishing campaigns that leverage trusted OpenCTI URLs to redirect users to malicious sites, increasing the likelihood of credential theft or malware infection. This can compromise user accounts and potentially expose sensitive cyber threat intelligence data. While the vulnerability does not directly allow system compromise or data exfiltration, the indirect effects through social engineering can be significant. Organizations involved in cybersecurity operations, government CERTs, and critical infrastructure sectors that rely on OpenCTI for threat intelligence sharing are particularly at risk. The medium severity indicates that while the vulnerability is not critical, it can be a stepping stone in multi-stage attacks targeting European entities. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed.
Mitigation Recommendations
European organizations should immediately upgrade OpenCTI installations to version 6.8.3 or later where the vulnerability is patched. Until upgrade is possible, implement strict input validation and sanitization on the RelayState parameter at the web application firewall (WAF) or reverse proxy level to block suspicious or external redirect URLs. Educate users about the risks of clicking on unexpected links, especially those involving authentication flows. Monitor logs for unusual redirect patterns or access to the /auth/saml/callback endpoint with suspicious RelayState values. Consider implementing additional SAML security controls such as validating RelayState against a whitelist of allowed URLs or enforcing strict origin checks. Regularly review and update incident response plans to address potential phishing or credential theft attempts stemming from this vulnerability. Finally, coordinate with OpenCTI community and vendors for timely updates and security advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Finland
CVE-2025-61782: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in OpenCTI-Platform opencti
Description
OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.8.3, an open redirect vulnerability exists in the OpenCTI platform's SAML authentication endpoint (/auth/saml/callback). By manipulating the RelayState parameter, an attacker can force the server to issue a 302 redirect to any external URL, enabling phishing, credential theft, and arbitrary site redirection. This issue has been patched in version 6.8.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-61782 is an open redirect vulnerability classified under CWE-601 found in the OpenCTI platform, an open-source cyber threat intelligence management tool. The flaw exists in the SAML authentication endpoint (/auth/saml/callback) prior to version 6.8.3. Specifically, the vulnerability arises from improper validation of the RelayState parameter, which is intended to preserve state information during SAML authentication flows. An attacker can craft a malicious URL that manipulates this parameter to redirect authenticated or unauthenticated users to arbitrary external websites. This redirection can be exploited to conduct phishing attacks, steal credentials, or redirect users to malicious sites, potentially leading to further compromise. The vulnerability does not require any privileges or authentication but does require user interaction to follow the malicious link. The CVSS v3.1 base score is 5.4, reflecting medium severity, with attack vector as network, low attack complexity, no privileges required, user interaction required, and limited impact on confidentiality and integrity but no impact on availability. No known exploits have been reported in the wild as of the publication date. The issue was resolved in OpenCTI version 6.8.3 by properly validating or restricting the RelayState parameter to prevent arbitrary redirection.
Potential Impact
For European organizations using OpenCTI versions prior to 6.8.3, this vulnerability poses a moderate risk. Successful exploitation can lead to phishing campaigns that leverage trusted OpenCTI URLs to redirect users to malicious sites, increasing the likelihood of credential theft or malware infection. This can compromise user accounts and potentially expose sensitive cyber threat intelligence data. While the vulnerability does not directly allow system compromise or data exfiltration, the indirect effects through social engineering can be significant. Organizations involved in cybersecurity operations, government CERTs, and critical infrastructure sectors that rely on OpenCTI for threat intelligence sharing are particularly at risk. The medium severity indicates that while the vulnerability is not critical, it can be a stepping stone in multi-stage attacks targeting European entities. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed.
Mitigation Recommendations
European organizations should immediately upgrade OpenCTI installations to version 6.8.3 or later where the vulnerability is patched. Until upgrade is possible, implement strict input validation and sanitization on the RelayState parameter at the web application firewall (WAF) or reverse proxy level to block suspicious or external redirect URLs. Educate users about the risks of clicking on unexpected links, especially those involving authentication flows. Monitor logs for unusual redirect patterns or access to the /auth/saml/callback endpoint with suspicious RelayState values. Consider implementing additional SAML security controls such as validating RelayState against a whitelist of allowed URLs or enforcing strict origin checks. Regularly review and update incident response plans to address potential phishing or credential theft attempts stemming from this vulnerability. Finally, coordinate with OpenCTI community and vendors for timely updates and security advisories.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-30T19:43:49.902Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e9b047349d0379db428c1
Added to database: 1/7/2026, 5:42:28 PM
Last enriched: 1/7/2026, 5:57:01 PM
Last updated: 1/8/2026, 10:56:44 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0730: Cross Site Scripting in PHPGurukul Staff Leave Management System
MediumCVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumCVE-2025-15464: CWE-926 Improper Export of Android Application Components in yintibao Fun Print Mobile
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.