Does CVE-2025-54419 affect passport-saml 3.x? #964
Replies: 1 comment 8 replies
-
Yes, passport-saml 3.x is affected. I updated the advisory: GHSA-4mxg-3p6v-xgq3 to reflect this.
Definitely. I strongly suggest sponsoring the maintainer if you want your feature requests to be put forward i.e. backporting security fixes. What would you think about an "Enterprise Security Plan" for SAML Libraries (like node-saml). As you know SAML is very prone to security vulnerabilities, due to its fragile design. We would (@SecureSAML), handle the security for the libraries. For example, we can give 2 weeks advanced notice of security vulnerabilities. This would be complemented with hot fixes and backports for the vulnerabilities. Additionally, we would offer threat detection services, such as detecting malicious SAML responses, offer a managed ruleset (WAF like). Your SAML implementation would be certified as secure (very important for enterprise customers). We would also make major security improvements with the funding. For example, refactoring the library to ensure that the authentication is proven secure. Integrating more security tests of all known SAML exploits. We would also quickly implement any feature requests. Overall, the Enterprise Security Plan would ensure that your enterprise customers can securely login with SAML. (Even if you aren't interest in buying, do you think that other companies would be interested?) |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
The vulnerability described in GHSA-4mxg-3p6v-xgq3 (CVE-2025-54419) is marked as affecting
@node-saml/node-saml
versions<=5.0.1
.@cjbarth I would be very grateful if you (or anyone else) could advise whether versions of
passport-saml
which predate the breakout of this library (which as far as I can tell was performed in version 4.0.0).For example, is an implementation that uses
passport-saml
version 3.2.4 considered vulnerable?Obviously,
main
branches should simply move forward to take the fix you have implemented, but it is a more nuanced question when it comes to older long-term supported software.Thanks for your time.
Beta Was this translation helpful? Give feedback.
All reactions