This vulnerability allows an attacker to impersonate any user during SAML authentication by tampering with a valid SAML response. This can be done by adding attributes to the response.
You are affected by this SAML Attribute Smuggling vulnerability if you are using passport-wsfed-saml2
version 4.6.3 or below, specifically under the following conditions:
1. The service provider is using passport-wsfed-saml2
,
2. A valid SAML Response signed by the Identity Provider can be obtained
Upgrade to v4.6.4 or greater.
{ "cwe_ids": [ "CWE-287", "CWE-290" ], "severity": "HIGH", "nvd_published_at": "2025-05-06T21:16:20Z", "github_reviewed_at": "2025-05-06T21:18:49Z", "github_reviewed": true }