PT-2026-41385 · Packagist · Simplesamlphp/Simplesamlphp-Module-Casserver

Published

2026-05-15

·

Updated

2026-05-15

·

CVE-2025-65954

CVSS v3.1

4.7

Medium

VectorAV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Summary

The logout endpoint accepts a url query parameter to redirect to. casserver treats that url as trusted, and either (depending on configuration) redirects the browser there, or shows a "you've been logged out" page with a link to continue to that url.
There are a number of other things broken with logout in 7 (cas v3 uses a different query parameters, etc)

Details

Previous module checked the url against the valid service urls.

PoC

The docker instructions from the README.md run an image with a vulnerable config.
Accessing https://localhost/cas/logout?url=https://google.com will redirect to Google

Impact

Impacted configs have
'enable logout' => true,
and are most impacted if they also have
'skip logout page' -> true,

Fix

Open Redirect

Weakness Enumeration

Related Identifiers

CVE-2025-65954
GHSA-CVRM-5HP6-H523

Affected Products

Simplesamlphp/Simplesamlphp-Module-Casserver