Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22555 | Node-SAML SAML Authentication Bypass |
Github GHSA |
GHSA-m837-g268-mmv7 | Node-SAML SAML Authentication Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 15 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Node-saml
Node-saml node-saml |
|
| Vendors & Products |
Node-saml
Node-saml node-saml |
Fri, 12 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reason: This candidate was issued in error. | Node-SAML is a SAML library not dependent on any frameworks that runs in Node. In versions 5.0.1 and below, Node-SAML loads the assertion from the (unsigned) original response document. This is different than the parts that are verified when checking signature. This allows an attacker to modify authentication details within a valid SAML assertion. For example, in one attack it is possible to remove any character from the SAML assertion username. This issue is fixed in version 5.1.0. |
| Title | Node-SAML SAML Authentication Bypass | |
| Weaknesses | CWE-347 CWE-87 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Thu, 24 Jul 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reason: This candidate was issued in error. |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-15T14:56:46.817Z
Reserved: 2025-07-21T16:12:20.732Z
Link: CVE-2025-54369
Updated: 2025-12-15T14:56:08.789Z
Status : Awaiting Analysis
Published: 2025-07-24T23:15:26.790
Modified: 2025-12-15T18:22:40.637
Link: CVE-2025-54369
No data.
OpenCVE Enrichment
Updated: 2025-12-14T21:15:17Z
EUVD
Github GHSA