Impact
The SimpleSAMLphp casserver module allows an attacker to supply an arbitrary URL in the logout request, and the module treats that URL as trusted. The application will redirect the browser to the supplied address without validation, creating a classic open redirect flaw (CWE-601) that can be leveraged to lure users to malicious sites and facilitate phishing or credential theft.
Affected Systems
SimpleSAMLphp module casserver (simplesamlphp-module-casserver) is affected. Any installation running version 6.x prior to 6.3.1 or 7.x prior to 7.0.0, and configured with 'enable_logout' set to true or 'skip_logout_page' set to true, is vulnerable.
Risk and Exploitability
The CVSS score of 4.7 reflects moderate severity; no EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. Exploitation is possible via the public web interface; an attacker only needs to provide a crafted logout link or force the victim to visit a malicious URL. The impact is limited to user session redirection but can be used as part of phishing or credential‑stealing campaigns.
OpenCVE Enrichment
Github GHSA