Impact
The xml-security library implements XML signatures and encryption. Versions prior to 2.3.1 and 1.13.9 lack validation of the authentication tag length for AES‑GCM encrypted nodes. This flaw allows an attacker to brute‑force an authentication tag, recover the GHASH key and decrypt the encrypted nodes, or forge arbitrary ciphertexts without knowing the encryption key. The result is a loss of confidentiality for data protected by XML encryption.
Affected Systems
The vulnerable product is simplesamlphp/xml-security. Any deployment that uses the library in versions older than 2.3.1 or 1.13.9 is affected. The CPE identifier cpe:2.3:a:simplesamlphp:xml-security:*:*:*:*:*:*:*:* applies to all affected releases.
Risk and Exploitability
The CVSS score of 8.2 categorizes this flaw as high severity. The EPSS score is below 1%, indicating a low probability of exploitation in the wild, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires supplying crafted XML that contains AES‑GCM encrypted nodes, so the attack vector is through malicious XML input, potentially via web services, SAML assertions, or other XML‑based communication.
OpenCVE Enrichment
Github GHSA