VYPR
Moderate severityNVD Advisory· Published Mar 5, 2026· Updated Mar 6, 2026

CVE-2026-27982

CVE-2026-27982

Description

An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Open redirect in django-allauth's SAML IdP-initiated SSO allows attackers to redirect users to arbitrary external websites via crafted RelayState parameter.

Root

Cause CVE-2026-27982 is an open redirect vulnerability in django-allauth versions prior to 65.14.1. The flaw resides in the SAML Identity Provider (IdP) initiated SSO feature, which is disabled by default. When enabled, the application uses the RelayState parameter from the SAML authentication response to redirect the user after login without validating the target URL. This allows an attacker to supply a crafted URL that redirects the user to an arbitrary external site [1][3].

Exploitation

Exploitation requires SAML IdP-initiated SSO to be enabled in the django-allauth configuration. An attacker must control or compromise the SAML IdP or craft a malicious SAML response containing a RelayState URL pointing to an external domain. When a user authenticates through the attacker-controlled IdP, the application processes the response and redirects the user to the attacker-specified URL [3][4]. The vulnerability has a CVSS v3 base score of 4.3 (Medium) and a CVSS v4 base score of 5.1 (Medium) [3].

Impact

An authenticated user who completes a SAML login session may be redirected to a phishing or malicious website controlled by the attacker. This can lead to credential theft, malware delivery, or other social engineering attacks, as the user trusts the legitimate application's redirect [3]. The open redirect bypasses browser protections and can be used to undermine the application's integrity.

Mitigation

The vulnerability is fixed in django-allauth version 65.14.1 and later [4]. The update ensures that redirect URLs from RelayState are properly validated against a whitelist or rejected if external. Users who have not enabled SAML IdP-initiated SSO are unaffected, as the feature is disabled by default. No workaround is available other than updating the software [1][3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
django-allauthPyPI
< 65.14.165.14.1

Affected products

1
  • allauth/django-allauthv5
    Range: prior to 65.14.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.