CVE-2025-54419

10.0 CRITICAL

📋 TL;DR

CVE-2025-54419 is a critical authentication bypass vulnerability in Node-SAML library versions 5.0.1 and earlier. It allows attackers to modify authentication details within valid SAML assertions by exploiting a signature verification flaw. Any Node.js application using vulnerable Node-SAML versions for SAML authentication is affected.

💻 Affected Systems

Products:
  • node-saml
Versions: 5.0.1 and earlier
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using Node-SAML for SAML authentication. Requires a valid signed SAML document from the identity provider to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete authentication bypass allowing attackers to impersonate any user, gain unauthorized access to protected systems, and potentially escalate privileges.

🟠

Likely Case

Authentication manipulation allowing attackers to modify usernames or other attributes in SAML assertions, leading to unauthorized access to applications.

🟢

If Mitigated

Limited impact if proper network segmentation, multi-factor authentication, and monitoring are in place to detect anomalous authentication attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a valid signed SAML document from the IdP. Attackers need to understand SAML protocol and have access to signed assertions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.0

Vendor Advisory: https://github.com/node-saml/node-saml/security/advisories/GHSA-4mxg-3p6v-xgq3

Restart Required: Yes

Instructions:

1. Update Node-SAML to version 5.1.0 or later using npm update node-saml. 2. Restart your Node.js application. 3. Verify the fix by testing SAML authentication flows.

🔧 Temporary Workarounds

Input validation enhancement

all

Implement additional validation of SAML assertion content beyond signature verification

🧯 If You Can't Patch

  • Implement additional authentication checks such as multi-factor authentication
  • Monitor SAML authentication logs for unusual patterns or username modifications

🔍 How to Verify

Check if Vulnerable:

Check package.json or node_modules/node-saml/package.json for version 5.0.1 or earlier

Check Version:

npm list node-saml

Verify Fix Applied:

Verify node-saml version is 5.1.0 or later and test SAML authentication with modified assertions

📡 Detection & Monitoring

Log Indicators:

  • Unusual username modifications in authentication logs
  • Failed signature verification attempts
  • SAML assertion parsing errors

Network Indicators:

  • Modified SAML assertions in authentication requests
  • Unexpected authentication source IPs

SIEM Query:

source="saml_auth" AND (event_type="authentication" AND username CONTAINS "-" OR username LENGTH changed)

🔗 References

📤 Share & Export