#VU125948 Open redirect in kimai2
Published: April 14, 2026
kimai2
Kevin Papst
Description
The vulnerability allows a remote attacker to redirect users to an attacker-controlled site.
The vulnerability exists due to url redirection to an untrusted site in src/Saml/Security/SamlAuthenticationSuccessHandler.php when processing the RelayState parameter in the SAML ACS handler. A remote attacker can supply a malicious RelayState value to redirect users to an attacker-controlled site.
SAML must be enabled, and exploitation is limited to IdP-initiated SSO flows where a malicious RelayState value is included. User interaction is required to complete SAML authentication.