PT-2025-31149 · Node-Saml · Node-Saml
Published
2025-07-28
·
Updated
2025-07-29
·
CVE-2025-54419
Published
2025-07-28
·
Updated
2025-07-29
·
CVE-2025-54419
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions:
Node-SAML versions 5.0.1 and below
Description:
Node-SAML improperly loads the assertion from the unsigned original response document, differing from the parts verified during signature checking. This allows modification of authentication details within a valid SAML assertion. An attacker could, for example, remove characters from the `username` within the SAML assertion. Exploitation requires a validly signed document from the identity provider (IdP).
Recommendations:
Update to version 5.1.0 or later.
Fix
Improper Verification of Cryptographic Signature
Improper Authentication