First published: Tue May 06 2025(Updated: )
### Overview This vulnerability allows an attacker to impersonate any user during SAML authentication by tampering with a valid SAML response. This can be done by adding attributes to the response. ### Am I Affected? You are affected by this SAML Attribute Smuggling vulnerability if you are using `passport-wsfed-saml2` version 4.6.3 or below, specifically under the following conditions: 1. The service provider is using `passport-wsfed-saml2`, 2. A valid SAML Response signed by the Identity Provider can be obtained ### Fix Upgrade to v4.6.4 or greater.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
passport-wsfed-saml2 | >=3.0.5<=4.6.3 | |
npm/passport-wsfed-saml2 | >=3.0.5<=4.6.3 | 4.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46573 is a high severity vulnerability that allows an attacker to impersonate any user during SAML authentication.
To fix CVE-2025-46573, update the passport-wsfed-saml2 library to a version later than 4.6.3.
CVE-2025-46573 affects passport-wsfed-saml2 versions from 3.0.5 up to and including 4.6.3.
CVE-2025-46573 allows attackers to exploit SAML responses, potentially leading to unauthorized access and impersonation of users.
There is no specific workaround for CVE-2025-46573; the best course of action is to upgrade to a secure version.