Article Details
Scrape Timestamp (UTC): 2025-05-21 22:16:59.622
Original Article Text
Click to Toggle View
Critical Samlify SSO flaw lets attackers log in as admin. A critical Samlify authentication bypass vulnerability has been discovered that allows attackers to impersonate admin users by injecting unsigned malicious assertions into legitimately signed SAML responses. Samlify is a high-level authentication library that helps developers integrate SAML SSO and Single Log-Out (SLO) into Node.js applications. It is a popular tool for building or connecting to identity providers (IdPs) and service providers (SPs) using SAML. The library is used by SaaS platforms, organizations implementing SSO for internal tools, developers integrating with corporate Identity Providers like Azure AD or Okta, and in federated identity management scenarios. It is very popular, measuring over 200,000 weekly downloads on npm. The flaw, tracked as CVE-2025-47949, is a critical (CVSS v4.0 score: 9.9) Signature Wrapping flaw impacting all versions of Samlify before 2.10.0. As EndorLabs explained in a report, Samlify correctly verifies that the XML document providing a user's identity is signed. Still, it proceeds to read fake assertions from a part of the XML that isn't. Attackers holding a valid signed SAML response through interception or via public metadata can modify it to exploit the parsing flaw in the library and authenticate as someone else. "The attacker then takes this legitimately signed XML document and manipulates it. They insert a second, malicious SAML Assertion into the document," explains EndorLabs. "This malicious assertion contains the identity of a target user (e.g., an administrator's username)." "The crucial part is that the valid signature from the original document still applies to a benign part of the XML structure, but the SP's vulnerable parsing logic will inadvertently process the unsigned, malicious assertion." This is a complete SSO bypass, allowing unauthorized remote attackers to perform privilege escalation and log in as administrators. The attacker needs no user interaction or special privileges, and the only requirement is access to a valid signed XML blob, making the exploitation relatively simple. To mitigate the risk, it is recommended that users upgrade to Samlify version 2.10.0, released earlier this month. Note that GitHub still offers 2.9.1 as the latest version, but npm hosts the safe-to-use 2.10.0 as of writing. There have not been any reports of active exploitation of CVE-2025-47949 in the wild, but impacted users are advised to take immediate action and secure their environments. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
A critical vulnerability in Samlify's SSO can enable attackers to impersonate administrators.
The flaw, identified as CVE-2025-47949, is a Signature Wrapping issue affecting all versions before 2.10.0.
Attackers can inject malicious, unsigned SAML Assertions into legitimately signed XML documents.
Samlify is widely used with over 200,000 downloads a week, impacting numerous SaaS platforms, internal tools, and federated identities.
No active exploitation of the vulnerability has been reported, but users are urged to update to version 2.10.0 immediately.
The core issue lies in Samlify’s handling of XML parsing, where it validates a signed document but fails to check all internal assertions.
The vulnerability allows complete SSO bypass and unauthorized privileged access without needing user interaction.