First published: Tue May 06 2025(Updated: )
### Overview This vulnerability allows an attacker to impersonate any user during SAML authentication by crafting a SAMLResponse. This can be done by using a valid SAML object that was signed by the configured IdP. ### Am I Affected? You are affected by this SAML Signature Wrapping vulnerability if you are using `passport-wsfed-saml2` version 4.6.3 or below, specifically under the following conditions: 1. The service provider is using `passport-wsfed-saml2`, 2. A valid SAML document signed by the Identity Provider can be obtained. ### Fix Upgrade to v4.6.4 or greater.
Affected Software | Affected Version | How to fix |
---|---|---|
npm/passport-wsfed-saml2 | >=3.0.5<=4.6.3 | 4.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The GHSA-wjmp-wphq-jvqf vulnerability is considered critical due to the potential for user impersonation during SAML authentication.
To fix GHSA-wjmp-wphq-jvqf, upgrade to version 4.6.4 or later of the passport-wsfed-saml2 package.
Users of passport-wsfed-saml2 versions between 3.0.5 and 4.6.3 are affected by the GHSA-wjmp-wphq-jvqf vulnerability.
An attacker can impersonate any user during SAML authentication by crafting a malicious SAMLResponse using a valid signed SAML object.
Web applications that implement SAML authentication using the vulnerable versions of the passport-wsfed-saml2 library are impacted by GHSA-wjmp-wphq-jvqf.