CVE-2020-5261
C# vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2020-5261) affects Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) versions greater than 2.0.0 and less than 2.5.0. The issue involves a faulty implementation of Token Replay Detection, which is a critical defense-in-depth measure for Single Sign-On solutions. The vulnerability was discovered and disclosed in March 2020, with version 2.5.0 released as a patch. Notably, version 1.0.1 and prior versions are not affected as they maintain a correct Token Replay Implementation (GitHub Advisory).

Technical details

The vulnerability stems from an improper implementation of Token Replay Detection in the SAML2 authentication process. The issue allows potential replay attacks where authentication tokens could be reused. The vulnerability has been assigned a CVSS v3.1 base score of 6.8 (Medium) by NVD and 8.2 (High) by GitHub, with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N. This indicates that while the attack requires high complexity, it can be executed remotely with low privileges and no user interaction (NVD).

Impact

The vulnerability could allow attackers to perform replay attacks by capturing and reusing authentication tokens. This could potentially lead to unauthorized authentication as another user, compromising both confidentiality and integrity of the affected systems. The severity of the impact depends on the context in which the library is being used (AttackerKB).

Mitigation and workarounds

The vulnerability has been patched in version 2.5.0 of the Sustainsys.Saml2 package. There are no workarounds for existing vulnerable versions, and fixing the issue requires updating to the patched version. Organizations using versions 2.0.0 through 2.4.0 should upgrade to version 2.5.0 or later (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67288CRITICAL10
  • C#C#
  • Umbraco.Cms
NoNoDec 22, 2025
CVE-2025-68618HIGH7.5
  • C#C#
  • libMagickCore-6_Q16-1
NoYesDec 30, 2025
CVE-2025-68950MEDIUM6.2
  • C#C#
  • libMagick++-7_Q16HDRI5
NoYesDec 30, 2025
CVE-2025-67291MEDIUM6.1
  • C#C#
  • Piranha
NoNoDec 22, 2025
CVE-2025-67290MEDIUM6.1
  • C#C#
  • Piranha
NoNoDec 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management