First published: Mon Jan 30 2023(Updated: )
The SAML SSO Standard WordPress plugin version 16.0.0 before 16.0.8, SAML SSO Premium WordPress plugin version 12.0.0 before 12.1.0 and SAML SSO Premium Multisite WordPress plugin version 20.0.0 before 20.0.7 does not validate that the redirect parameter to its SSO login endpoint points to an internal site URL, making it vulnerable to an Open Redirect issue when the user is already logged in.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
miniOrange SAML SP Single Sign On | >=12.0.0<12.1.0 | |
miniOrange SAML SP Single Sign On | >=16.0.0<16.0.8 | |
miniOrange SAML SP Single Sign On | >=20.0.0<20.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4496 is a vulnerability in the SAML SSO Standard WordPress plugin version 16.0.0 before 16.0.8, SAML SSO Premium WordPress plugin version 12.0.0 before 12.1.0, and SAML SSO Premium Multisite WordPress plugin version 20.0.0 before 20.0.7.
CVE-2022-4496 allows an attacker to bypass SSO login by using a malicious redirect parameter.
CVE-2022-4496 has a severity value of 6.1 (medium).
To fix CVE-2022-4496, update the SAML SSO plugins to version 16.0.8 (Standard), 12.1.0 (Premium), or 20.0.7 (Multisite).
You can find more information about CVE-2022-4496 at the following references: [Reference 1](https://wpscan.com/vulnerability/af2e30c7-0787-4fe2-97ee-bc616f7178a1), [Reference 2](https://wpscan.com/vulnerability/be21f355-0e5b-4ad7-9d8f-85e9a0101ddc), [Reference 3](https://wpscan.com/vulnerability/e6c4c8c7-1dcd-45bf-8582-f12accca6fac).