A SAML library not dependent on any frameworks that runs in Node. In version 5.0.1, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0.
History

Tue, 29 Jul 2025 12:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Tue, 29 Jul 2025 08:00:00 +0000

Type Values Removed Values Added
First Time appeared Node-saml
Node-saml node-saml
Vendors & Products Node-saml
Node-saml node-saml

Mon, 28 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Jul 2025 20:45:00 +0000

Type Values Removed Values Added
Description A SAML library not dependent on any frameworks that runs in Node. In versions 5.0.1 and below, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0. A SAML library not dependent on any frameworks that runs in Node. In version 5.0.1, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0.

Mon, 28 Jul 2025 20:00:00 +0000

Type Values Removed Values Added
Description A SAML library not dependent on any frameworks that runs in Node. In versions 5.0.1 and below, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. To conduct the attack an attacker would need a validly signed document from the identity provider (IdP). This is fixed in version 5.1.0.
Title Node-SAML Contains SAML Signature Verification Vulnerability
Weaknesses CWE-287
CWE-347
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-28T19:47:46.584Z

Updated: 2025-07-28T20:39:07.897Z

Reserved: 2025-07-21T23:18:10.281Z

Link: CVE-2025-54419

cve-icon Vulnrichment

Updated: 2025-07-28T20:22:08.901Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-28T20:17:48.403

Modified: 2025-07-29T14:14:29.590

Link: CVE-2025-54419

cve-icon Redhat

Severity : Important

Publid Date: 2025-07-28T19:47:46Z

Links: CVE-2025-54419 - Bugzilla