An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271).
This issue affects Shibboleth Service Provider through 3.5.0.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 11 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shibboleth
Shibboleth service Provider |
|
| Vendors & Products |
Shibboleth
Shibboleth service Provider |
Wed, 10 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 10 Sep 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0. | |
| Title | Unauthenticated SQL Injection Vulnerability in Shibboleth Service Provider | |
| Weaknesses | CWE-89 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-09-10T06:45:50.883Z
Updated: 2025-11-04T22:06:49.754Z
Reserved: 2025-09-03T12:56:22.575Z
Link: CVE-2025-9943
Updated: 2025-11-04T22:06:49.754Z
Status : Awaiting Analysis
Published: 2025-09-10T07:15:47.153
Modified: 2025-11-04T22:16:46.227
Link: CVE-2025-9943
No data.