GHSA-8gqj-226h-gm8r

Suggest an improvement
Source
https://github.com/advisories/GHSA-8gqj-226h-gm8r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-8gqj-226h-gm8r/GHSA-8gqj-226h-gm8r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8gqj-226h-gm8r
Aliases
Published
2025-05-06T21:18:49Z
Modified
2025-05-07T15:34:30Z
Severity
  • 8.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Passport-wsfed-saml2 allows SAML Authentication Bypass via Attribute Smuggling
Details

Overview

This vulnerability allows an attacker to impersonate any user during SAML authentication by tampering with a valid SAML response. This can be done by adding attributes to the response.

Am I Affected?

You are affected by this SAML Attribute Smuggling vulnerability if you are using passport-wsfed-saml2 version 4.6.3 or below, specifically under the following conditions: 1. The service provider is using passport-wsfed-saml2, 2. A valid SAML Response signed by the Identity Provider can be obtained

Fix

Upgrade to v4.6.4 or greater.

Database specific
{
    "cwe_ids": [
        "CWE-287",
        "CWE-290"
    ],
    "severity": "HIGH",
    "nvd_published_at": "2025-05-06T21:16:20Z",
    "github_reviewed_at": "2025-05-06T21:18:49Z",
    "github_reviewed": true
}
References

Affected packages

npm / passport-wsfed-saml2

Package

Name
passport-wsfed-saml2
View open source insights on deps.dev
Purl
pkg:npm/passport-wsfed-saml2

Affected ranges

Type
SEMVER
Events
Introduced
3.0.5
Fixed
4.6.4

Database specific

{
    "last_known_affected_version_range": "<= 4.6.3"
}