CVE-2025-54419

A · A SAML library not dependent on any frameworks that runs in Multiple Products

A critical authentication bypass vulnerability exists in a widely used Node.js SAML library.

Executive summary

A critical authentication bypass vulnerability exists in a widely used Node.js SAML library. This flaw allows an unauthenticated attacker to tamper with SAML assertions to impersonate any user, including administrators, and gain complete unauthorized access to protected applications. Due to the critical nature of this vulnerability (CVSS 10), successful exploitation would result in a full compromise of the affected system's confidentiality, integrity, and availability.

Vulnerability

The vulnerability is a form of XML Signature Wrapping. The SAML library incorrectly processes incoming SAML responses by validating the digital signature on one part of the XML document while loading the user's identity (the assertion) from a different, unsigned part of the original document. An attacker positioned to intercept SAML traffic (e.g., via a Man-in-the-Middle attack) can craft a malicious response. This response would contain the original, validly signed assertion to pass the signature check, but also include a second, unsigned assertion with elevated privileges (e.g., a different username). The library validates the signed portion but then mistakenly uses the unsigned, malicious assertion to grant the attacker access.

Business impact

This vulnerability is of critical severity with a CVSS score of 10, representing the highest possible risk. Exploitation allows a complete authentication bypass, enabling an attacker to impersonate any legitimate user, including highly privileged administrators. The business impact includes the potential for a catastrophic data breach of sensitive customer or corporate information, unauthorized modification or deletion of critical data, and complete service disruption. This could lead to severe financial losses, significant reputational damage, and potential regulatory penalties for non-compliance with data protection standards.

Remediation

Immediate Action: Update the vulnerable SAML library to the latest patched version across all affected applications immediately. After patching, it is crucial to monitor for any signs of exploitation attempts that may have occurred prior to remediation and to review application and authentication access logs for anomalous activity.

Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes reviewing SAML IdP and Service Provider logs for malformed SAML responses or authentication anomalies, such as a failed login attempt immediately followed by a successful one from the same IP address. Monitor application logs for user sessions originating from unusual IP addresses or geographic locations, especially for administrative accounts.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to mitigate risk. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block XML Signature Wrapping attacks. Enforce strict network segmentation to limit an attacker's lateral movement should an application be compromised. Additionally, ensure that critical applications enforce Multi-Factor Authentication (MFA) independently of the SAML SSO flow, as this can provide an additional layer of defense.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a critical and immediate threat to the organization. Due to the CVSS 10 score and the risk of complete system compromise, immediate remediation is a top priority. Security and development teams must collaborate to identify all instances of the vulnerable SAML library within the environment and deploy the vendor-supplied patch without delay. Given the potential for impersonation of any user, it is imperative to treat this as an active threat and assume that attackers will soon attempt to exploit it.