CVE-2025-24894

9.1 CRITICAL

📋 TL;DR

This vulnerability in SPID.AspNetCore.Authentication allows attackers to bypass SAML signature validation by injecting a signed XML element. This enables impersonation of any SPID or CIE user on affected systems. All systems using vulnerable versions of this authentication library are affected.

💻 Affected Systems

Products:
  • SPID.AspNetCore.Authentication
Versions: All versions before 3.4.0
Operating Systems: All platforms running ASP.NET Core applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all implementations using the vulnerable SAML signature validation logic.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete authentication bypass allowing attackers to impersonate any user, access sensitive data, and perform unauthorized actions as any legitimate user.

🟠

Likely Case

Authentication bypass leading to unauthorized access to protected resources and potential data exposure.

🟢

If Mitigated

Limited impact if proper network segmentation and additional authentication layers are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires knowledge of SAML and access to IdP public metadata, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.0

Vendor Advisory: https://github.com/italia/spid-aspnetcore/security/advisories/GHSA-36h8-r92j-w9vw

Restart Required: Yes

Instructions:

1. Update NuGet package to version 3.4.0 or later. 2. Update package reference in your project file. 3. Rebuild and redeploy your application. 4. Restart the application.

🧯 If You Can't Patch

  • Implement additional authentication layer (e.g., multi-factor authentication)
  • Monitor authentication logs for suspicious patterns and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check the installed NuGet package version in your project. If version is below 3.4.0, you are vulnerable.

Check Version:

dotnet list package SPID.AspNetCore.Authentication

Verify Fix Applied:

Verify that the package version is 3.4.0 or higher in your project dependencies and that the application is using the updated library.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple authentication attempts from same source with different user identities
  • SAML responses with unexpected XML structures

Network Indicators:

  • Unusual SAML traffic patterns
  • SAML responses with multiple signatures or unexpected XML elements

SIEM Query:

source="authentication_logs" AND (event="SAML_authentication" AND (xml_element_count > threshold OR signature_count > 1))

🔗 References

📤 Share & Export