This issue affects Shibboleth Service Provider through 3.5.0.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4300-1 | shibboleth-sp security update |
EUVD |
EUVD-2025-27518 | An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0. |
Solution
Update to Shibboleth Service Provider 3.5.1 or higher. The vendor provides an updated version here: https://shibboleth.net/downloads/service-provider/3.5.1/
Workaround
Use any other non-ODBC StorageService for the ReplayCache.
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 11 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shibboleth
Shibboleth service Provider |
|
| Vendors & Products |
Shibboleth
Shibboleth service Provider |
Wed, 10 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 10 Sep 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0. | |
| Title | Unauthenticated SQL Injection Vulnerability in Shibboleth Service Provider | |
| Weaknesses | CWE-89 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-04T22:06:49.754Z
Reserved: 2025-09-03T12:56:22.575Z
Link: CVE-2025-9943
Updated: 2025-11-04T22:06:49.754Z
Status : Awaiting Analysis
Published: 2025-09-10T07:15:47.153
Modified: 2025-11-04T22:16:46.227
Link: CVE-2025-9943
No data.
OpenCVE Enrichment
Updated: 2025-09-11T10:42:51Z
Debian DLA
EUVD