Jump to the main content block

[Vulnerability Alert] Critical Security Vulnerability in Node.js Library Samlify (CVE-2025-47949)

publish date : 2025-06-02 update date : 2025-06-02

Source: Ministry of education information & communication security contingency platform

Publication Number TACERT-ANA-2025052808050909 Publication Time 2025/05/28 08:59
Incident Type ANA-Vulnerability Alert Discovery Time 2025/05/28 08:59
Impact Level Low  
[Subject]
[Vulnerability Alert] Critical Security Vulnerability in Node.js Library Samlify (CVE-2025-47949)
[Content]
Forwarded from TWCERTCC-200-202505-00000021

Samlify is a key library for implementing SAML 2.0 on the Node.js platform. It provides high-level APIs to help developers integrate Single Sign-On (SSO) and Identity and Access Management (IAM) systems. A critical vulnerability (CVE-2025-47949, CVSS 4.x: 9.9) was recently disclosed. This flaw allows unauthenticated attackers to exploit a weakness in the signature verification mechanism to forge SAML responses and impersonate any user, including system administrators.

Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]
Samlify versions prior to 2.10.0
[Recommended Actions]
Please update to version 2.10.0 or later.
[Reference]
https://www.twcert.org.tw/tw/cp-169-10155-48fe7-1.html
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: