Passport-wsfed-saml2 allows SAML Authentication Bypass via Signature Wrapping
Critical severity
GitHub Reviewed
Published
May 6, 2025
in
auth0/passport-wsfed-saml2
•
Updated May 6, 2025
Description
Published by the National Vulnerability Database
May 6, 2025
Published to the GitHub Advisory Database
May 6, 2025
Reviewed
May 6, 2025
Last updated
May 6, 2025
Overview
This vulnerability allows an attacker to impersonate any user during SAML authentication by crafting a SAMLResponse. This can be done by using a valid SAML object that was signed by the configured IdP.
Am I Affected?
You are affected by this SAML Signature Wrapping vulnerability if you are using
passport-wsfed-saml2
version 4.6.3 or below, specifically under the following conditions:passport-wsfed-saml2
,Fix
Upgrade to v4.6.4 or greater.
References