The vulnerability is an Open Redirect on the login page of DiracX-Web, identified as CVE-2025-54066. The root cause is the lack of validation of the redirect URL parameter, which is used to redirect users after they authenticate.
The analysis of the provided patch eba3b7bc4f9d394074215986e6d3c15b546b25d5 reveals that two React components were involved in this vulnerability:
-
OIDCSecure: This component is responsible for handling unauthenticated users. The vulnerable version of this component would construct a redirect URL to the login page (/auth) and append the user's current location as a redirect parameter. This action introduced the untrusted data into the application flow.
-
LoginForm: This component handles the user login process. The vulnerable version of this component would read the redirect parameter from the URL after a successful login and redirect the user to the provided URL without validating it. This is the sink of the vulnerability, where the actual redirection to a potentially malicious site occurs.
The patch rectifies this by removing the logic that handles the redirect parameter. In OIDCSecure, the redirect to the login page no longer includes the redirect parameter. In LoginForm, the post-login redirection is hardcoded to the root path (/), eliminating the possibility of an open redirect.
Therefore, an engineer looking for this vulnerability in their environment should focus on runtime profiles that show calls to OIDCSecure for unauthenticated redirects and LoginForm for post-authentication redirects, as these are the key functions involved in the exploitation of this vulnerability.