OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.8.3, an open redirect vulnerability exists in the OpenCTI platform's SAML authentication endpoint (/auth/saml/callback). By manipulating the RelayState parameter, an attacker can force the server to issue a 302 redirect to any external URL, enabling phishing, credential theft, and arbitrary site redirection. This issue has been patched in version 6.8.3.
References
Configurations
History
20 Jan 2026, 18:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/OpenCTI-Platform/opencti/commit/f755165a26888925c4a58018f7238ff92a0bd378 - Patch | |
| References | () https://github.com/OpenCTI-Platform/opencti/releases/tag/6.8.3 - Release Notes | |
| References | () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jc3f-c62g-v7qw - Third Party Advisory | |
| First Time |
Citeum
Citeum opencti |
|
| CPE | cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:* |
07 Jan 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-07 18:15
Updated : 2026-01-20 18:50
NVD link : CVE-2025-61782
Mitre link : CVE-2025-61782
CVE.ORG link : CVE-2025-61782
JSON object : View
Products Affected
citeum
- opencti
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
