An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271).

This issue affects Shibboleth Service Provider through 3.5.0.
Fixes

Solution

Update to Shibboleth Service Provider 3.5.1 or higher. The vendor provides an updated version here:  https://shibboleth.net/downloads/service-provider/3.5.1/


Workaround

Use any other non-ODBC StorageService for the ReplayCache.

History

Wed, 10 Sep 2025 07:00:00 +0000

Type Values Removed Values Added
Description An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0.
Title Unauthenticated SQL Injection Vulnerability in Shibboleth Service Provider
Weaknesses CWE-89
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2025-09-10T06:45:50.883Z

Reserved: 2025-09-03T12:56:22.575Z

Link: CVE-2025-9943

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-10T07:15:47.153

Modified: 2025-09-10T07:15:47.153

Link: CVE-2025-9943

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.