Impact
The vulnerability is an open redirect flaw in the SAML IdP initiated SSO feature of django-allauth. Prior to version 65.14.1, attackers can craft URLs that cause authenticated users to be sent to arbitrary external websites once the feature is enabled. This could be used for phishing or social engineering attacks, compromising user trust and potentially exposing sensitive data. The weakness is identified as CWE-601.
Affected Systems
Systems that use the django-allauth library installed with a version older than 65.14.1 and have SAML IdP initiated SSO enabled are affected. This includes any Django application that imports allauth:django-allauth and has not applied the 65.14.1 release. The vulnerability is present in all custom installations that enable the feature without a URL whitelist.
Risk and Exploitability
The assigned CVSS score of 5.1 indicates medium severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the general population. However, because the attack vector relies on user interaction with a crafted link, the risk is largely contingent on the attacker’s ability to lure users to the malicious URL. The vulnerability is not currently listed in the CISA KEV catalog, but administrators should still patch promptly to prevent phishing or credential compromise scenarios.
OpenCVE Enrichment
Github GHSA