Description
An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.
Published: 2026-03-05
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open redirect
Action: Patch
AI Analysis

Impact

The vulnerability is an open redirect flaw in the SAML IdP initiated SSO feature of django-allauth. Prior to version 65.14.1, attackers can craft URLs that cause authenticated users to be sent to arbitrary external websites once the feature is enabled. This could be used for phishing or social engineering attacks, compromising user trust and potentially exposing sensitive data. The weakness is identified as CWE-601.

Affected Systems

Systems that use the django-allauth library installed with a version older than 65.14.1 and have SAML IdP initiated SSO enabled are affected. This includes any Django application that imports allauth:django-allauth and has not applied the 65.14.1 release. The vulnerability is present in all custom installations that enable the feature without a URL whitelist.

Risk and Exploitability

The assigned CVSS score of 5.1 indicates medium severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the general population. However, because the attack vector relies on user interaction with a crafted link, the risk is largely contingent on the attacker’s ability to lure users to the malicious URL. The vulnerability is not currently listed in the CISA KEV catalog, but administrators should still patch promptly to prevent phishing or credential compromise scenarios.

Generated by OpenCVE AI on April 17, 2026 at 12:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade django-allauth to version 65.14.1 or newer.
  • Disable SAML IdP initiated SSO if the feature is not needed.
  • Configure the application to validate redirect targets against a whitelist of trusted domains to mitigate remaining open redirect risk.

Generated by OpenCVE AI on April 17, 2026 at 12:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2jpr-83rg-v67j django-allauth has an open redirect vulnerability
History

Mon, 09 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Allauth allauth
CPEs cpe:2.3:a:allauth:allauth:*:*:*:*:*:django:*:*
Vendors & Products Allauth allauth
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Fri, 06 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Allauth
Allauth django-allauth
Vendors & Products Allauth
Allauth django-allauth

Thu, 05 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title django-allauth: django-allauth: Open redirect via crafted URL in SAML IdP initiated SSO
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

threat_severity

Moderate


Thu, 05 Mar 2026 05:45:00 +0000

Type Values Removed Values Added
Description An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.
Weaknesses CWE-601
References
Metrics cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Allauth Allauth Django-allauth
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-03-06T18:19:55.985Z

Reserved: 2026-02-25T04:48:37.210Z

Link: CVE-2026-27982

cve-icon Vulnrichment

Updated: 2026-03-06T18:19:47.574Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T06:16:30.100

Modified: 2026-03-09T18:41:21.237

Link: CVE-2026-27982

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-05T05:31:25Z

Links: CVE-2026-27982 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:00:12Z

Weaknesses