CVE-2025-61782

5.4 MEDIUM

📋 TL;DR

OpenCTI versions before 6.8.3 contain an open redirect vulnerability in the SAML authentication callback endpoint. Attackers can manipulate the RelayState parameter to redirect users to malicious external websites, enabling phishing attacks and credential theft. All OpenCTI deployments using SAML authentication are affected.

💻 Affected Systems

Products:
  • OpenCTI
Versions: All versions prior to 6.8.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using SAML authentication. Basic authentication deployments are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to convincing phishing sites that steal credentials or deliver malware, potentially compromising the entire OpenCTI instance and connected systems.

🟠

Likely Case

Attackers use the redirect for phishing campaigns targeting OpenCTI users, potentially stealing credentials or session tokens.

🟢

If Mitigated

With proper user awareness training and browser security controls, users may recognize suspicious redirects before entering credentials.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to craft a malicious SAML callback URL and trick a user into clicking it. No authentication bypass is needed once the user initiates SAML login.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.8.3

Vendor Advisory: https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-jc3f-c62g-v7qw

Restart Required: Yes

Instructions:

1. Backup your OpenCTI instance and database. 2. Update to OpenCTI version 6.8.3 or later. 3. Restart all OpenCTI services. 4. Verify the fix by testing the SAML callback endpoint.

🔧 Temporary Workarounds

Disable SAML Authentication

all

Temporarily disable SAML authentication and use alternative authentication methods until patching is possible.

Modify OpenCTI configuration to remove SAML settings and enable basic authentication or other supported methods.

Web Application Firewall Rule

all

Add WAF rules to block malicious redirect attempts through the SAML callback endpoint.

Add rule to block requests to /auth/saml/callback with suspicious RelayState parameters containing external domains.

🧯 If You Can't Patch

  • Implement strict URL validation at the network perimeter to block redirects to external domains from the OpenCTI instance.
  • Enable browser security features like anti-phishing protection and educate users to verify URLs before entering credentials.

🔍 How to Verify

Check if Vulnerable:

Test the SAML callback endpoint by attempting to redirect to an external domain via the RelayState parameter. If redirect succeeds, the system is vulnerable.

Check Version:

Check the OpenCTI web interface admin panel or run: docker exec opencti_platform cat /usr/share/opencti/package.json | grep version

Verify Fix Applied:

After updating to 6.8.3+, test the SAML callback endpoint with malicious RelayState parameters. The system should reject external redirects.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 302 redirect responses from /auth/saml/callback to external domains
  • SAML authentication requests with unusual RelayState parameters

Network Indicators:

  • Outbound HTTP redirects from OpenCTI server to unfamiliar external domains following SAML authentication

SIEM Query:

source="opencti" AND (url="/auth/saml/callback" AND status=302 AND redirect_domain NOT IN ("trusted-domains.com"))

🔗 References

📤 Share & Export