CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-3573-4C68-G8CC
6.10.12%

Return to Sender: Weaponizing SAML RelayState in Directus

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 6, 2026·6 min read·9 visits

PoC Available

Executive Summary (TL;DR)

Directus failed to validate the `RelayState` parameter in its SAML driver during the authentication callback. While it checked redirect URLs at the start of a login attempt, it blindly trusted the state returned by the Identity Provider. This allows attackers to craft login links that, upon successful authentication, immediately bounce users to malicious domains—a perfect setup for high-credibility phishing campaigns.

A deep dive into an Open Redirect vulnerability within Directus's SAML authentication driver, allowing attackers to hijack post-login flows via unvalidated RelayState parameters.

Official Patches

DirectusGitHub Commit fixing the issue

Fix Analysis (1)

Technical Appendix

CVSS Score
6.1/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Probability
0.12%
Top 99% most exploited

Affected Systems

Directus CMS (@directus/api)SAML Authentication Driver

Affected Versions Detail

Product
Affected Versions
Fixed Version
@directus/api
Directus
< Dec 9 2025 (Commit dad9576)Post-Dec 9 2025 Release
AttributeDetail
Vulnerability TypeOpen Redirect
CWE IDCWE-601
Affected Componentapi/src/auth/drivers/saml.ts
Attack VectorNetwork (Web)
CVSS (Estimated)6.1 (Medium)
Patch Date2025-12-09

MITRE ATT&CK Mapping

T1204.001User Execution: Malicious Link
Execution
T1566.002Phishing: Spearphishing Link
Initial Access
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')

The software redirects the user to a destination that is not part of the site's domain or an allowed list, which can assist in phishing attacks.

Known Exploits & Detection

N/AVulnerability inferred from patch diff analysis.

Vulnerability Timeline

Fix Committed to Master
2025-12-09

References & Sources

  • [1]GitHub Advisory GHSA-3573-4c68-g8cc
  • [2]Pull Request #26346

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.