CVE-2025-9943SQL Injection in Service Provider

CWE-89SQL Injection5 documents5 sources
Severity
9.1CRITICALNVD
EPSS
0.2%
top 61.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 10

Description

An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

Affected Packages2 packages

Debianinternet2/shibboleth-sp< 3.2.2+dfsg1-1+deb11u1+3

🔴Vulnerability Details

3
OSV
CVE-2025-9943: An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider2025-09-10
GHSA
GHSA-p7fp-v35q-pm7j: An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider2025-09-10
CVEList
Unauthenticated SQL Injection Vulnerability in Shibboleth Service Provider2025-09-10

📋Vendor Advisories

1
Debian
CVE-2025-9943: shibboleth-sp - An SQL injection vulnerability has been identified in the "ID" attribute of the ...2025
CVE-2025-9943 — SQL Injection in Service Provider | cvebase