samlify is a Node.js library for SAML single sign-on. A Signature Wrapping attack has been found in samlify prior to version 2.10.0, allowing an attacker to forge a SAML Response to authenticate as any user. An attacker would need a signed XML document by the identity provider. Version 2.10.0 fixes the issue.
References
Configurations
History
19 Sep 2025, 17:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tngan/samlify/commit/115679acd89f0a37ea3ebd8fff7db54fca3e8af3 - Patch | |
References | () https://github.com/tngan/samlify/security/advisories/GHSA-r683-v43c-6xqv - Vendor Advisory | |
First Time |
Samlify Project
Samlify Project samlify |
|
CPE | cpe:2.3:a:samlify_project:samlify:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
21 May 2025, 20:25
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-19 20:15
Updated : 2025-09-19 17:32
NVD link : CVE-2025-47949
Mitre link : CVE-2025-47949
CVE.ORG link : CVE-2025-47949
JSON object : View
Products Affected
samlify_project
- samlify
CWE
CWE-347
Improper Verification of Cryptographic Signature