Show plain JSON{"id": "CVE-2025-27773", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 3.9}]}, "published": "2025-03-11T19:15:43.677", "references": [{"url": "https://github.com/simplesamlphp/saml2/blob/9545abd0d9d48388f2fa00469c5c1e0294f0303e/src/SAML2/HTTPRedirect.php#L104-L113", "source": "security-advisories@github.com"}, {"url": "https://github.com/simplesamlphp/saml2/blob/9545abd0d9d48388f2fa00469c5c1e0294f0303e/src/SAML2/HTTPRedirect.php#L178-L217", "source": "security-advisories@github.com"}, {"url": "https://github.com/simplesamlphp/saml2/commit/7867d6099dc7f31bed1ea10e5bea159c5623d2a0", "source": "security-advisories@github.com"}, {"url": "https://github.com/simplesamlphp/saml2/security/advisories/GHSA-46r4-f8gj-xg56", "source": "security-advisories@github.com"}, {"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00013.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-347"}]}], "descriptions": [{"lang": "en", "value": "The SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functionality. Prior to versions 4.17.0 and 5.0.0-alpha.20, there is a signature confusion attack in the HTTPRedirect binding. An attacker with any signed SAMLResponse via the HTTP-Redirect binding can cause the application to accept an unsigned message. Versions 4.17.0 and 5.0.0-alpha.20 contain a fix for the issue."}, {"lang": "es", "value": "La librer\u00eda SimpleSAMLphp SAML2 es una librer\u00eda PHP para funcionalidades relacionadas con SAML2. En versiones anteriores a la 4.17.0 y la 5.0.0-alpha.20, exist\u00eda un ataque de confusi\u00f3n de firmas en el enlace HTTPRedirect. Un atacante con cualquier SAMLResponse firmada mediante el enlace HTTP-Redirect pod\u00eda provocar que la aplicaci\u00f3n aceptara un mensaje sin firmar. Las versiones 4.17.0 y 5.0.0-alpha.20 incluyen una soluci\u00f3n para este problema."}], "lastModified": "2025-05-09T20:15:38.887", "sourceIdentifier": "security-advisories@github.com"}