Home

Description

An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0.

PUBLISHED Reserved 2025-09-03 | Published 2025-09-10 | Updated 2025-09-10 | Assigner SEC-VLab

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version
affected

Credits

Florian Stuhlmann, SEC Consult Vulnerability Lab finder

References

shibboleth.net/community/advisories/secadv_20250903.txt vendor-advisory

r.sec-consult.com/shibboleth third-party-advisory

shibboleth.net/downloads/service-provider/3.5.1/ patch

cve.org (CVE-2025-9943)

nvd.nist.gov (CVE-2025-9943)

Download JSON