CVE-2025-9943

An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0.
Configurations

No configuration.

History

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2025/Sep/40 -

03 Nov 2025, 19:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/09/msg00015.html -

10 Sep 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

10 Sep 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-10 07:15

Updated : 2025-11-04 22:16


NVD link : CVE-2025-9943

Mitre link : CVE-2025-9943

CVE.ORG link : CVE-2025-9943


JSON object : View

Products Affected

No product.

CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')