Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. passport-wsfed-saml2
  4. ›
  5. CVE-2025-46573

CVE-2025-46573: Passport-wsfed-saml2 allows SAML Authentication Bypass via Attribute Smuggling

May 6, 2025 (updated May 7, 2025)

Overview

This vulnerability allows an attacker to impersonate any user during SAML authentication by tampering with a valid SAML response. This can be done by adding attributes to the response.

Am I Affected?

You are affected by this SAML Attribute Smuggling vulnerability if you are using passport-wsfed-saml2 version 4.6.3 or below, specifically under the following conditions:

  1. The service provider is using passport-wsfed-saml2,
  2. A valid SAML Response signed by the Identity Provider can be obtained

Fix

Upgrade to v4.6.4 or greater.

References

  • github.com/advisories/GHSA-8gqj-226h-gm8r
  • github.com/auth0/passport-wsfed-saml2
  • github.com/auth0/passport-wsfed-saml2/commit/e5cf3cc2a53748207f7a81bfba9195c8efa94181
  • github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-8gqj-226h-gm8r
  • nvd.nist.gov/vuln/detail/CVE-2025-46573

Code Behaviors & Features

Detect and mitigate CVE-2025-46573 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.5 before 4.6.4

Fixed versions

  • 4.6.4

Solution

Upgrade to version 4.6.4 or above.

Weakness

  • CWE-287: Improper Authentication
  • CWE-290: Authentication Bypass by Spoofing

Source file

npm/passport-wsfed-saml2/CVE-2025-46573.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.