CVE-2025-9943

9.1 CRITICAL
Published: September 10, 2025 Modified: November 04, 2025

Description

An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin.Β The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://r.sec-consult.com/shibboleth
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
https://shibboleth.net/community/advisories/secadv_20250903.txt
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
https://shibboleth.net/downloads/service-provider/3.5.1/
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
http://seclists.org/fulldisclosure/2025/Sep/40
Source: af854a3a-2127-422b-91ae-364da2661108

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.1 / 10.0
EPSS (Exploit Probability)
0.1%
35th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)