Bug 2444764 (CVE-2026-27982)

Summary: CVE-2026-27982 django-allauth: django-allauth: Open redirect via crafted URL in SAML IdP initiated SSO
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jmitchel, kshier, pbohmill, teagle
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in django-allauth. This open redirect vulnerability exists when Security Assertion Markup Language (SAML) Identity Provider (IdP) initiated Single Sign-On (SSO) is enabled, which is disabled by default. A remote attacker could exploit this by crafting a malicious URL, potentially redirecting users to an arbitrary external website. This could lead to information disclosure or phishing attacks.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2444766, 2444767    
Bug Blocks:    

Description OSIDB Bzimport 2026-03-05 06:01:34 UTC
An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL.