CVE-2025-31335
Linux Debian vulnerability analysis and mitigation

Overview

The OpenSAML C++ library before version 3.3.1 contains a critical security vulnerability (CVE-2025-31335) that allows attackers to forge signed SAML messages through parameter manipulation when using SAML bindings that rely on non-XML signatures. This vulnerability was discovered by Alexander Tan of SecureSAML and was publicly disclosed on March 13, 2025 (Shibboleth Advisory).

Technical details

The vulnerability stems from a flaw in the library's signature verification process for non-XML based signed messages. The issue allows creative manipulation of parameters combined with reuse of contents from older requests to bypass the library's signature verification mechanisms. This vulnerability particularly affects the HTTP-POST-SimpleSign SAML binding for Single Sign-On responses and is enabled by default. The vulnerability has been assigned a CVSS v3.1 base score of 4.0 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N (NVD).

Impact

The vulnerability has critical security implications in specific scenarios, particularly affecting the Shibboleth Service Provider and implementations built on top of the OpenSAML library. It enables attackers to forge signed SAML messages, potentially leading to authentication bypass and unauthorized access to protected resources. The impact is especially severe when using the HTTP-POST-SimpleSign SAML binding for Single Sign-On responses (Shibboleth Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to OpenSAML library version 3.3.1 or later. For non-Windows platforms, updating the library and restarting the 'shibd' daemon is sufficient. Windows users must install Shibboleth Service Provider V3.5.0.1 or later. As a temporary workaround, users can remove the 'SimpleSigning' security policy rule from the security-policy.xml file, though this will prevent support for legitimate signed requests or responses via the HTTP-Redirect binding. Alternatively, removing the HTTP-Redirect binding from an SP's metadata will force IdPs to use the HTTP-POST binding with XML-based signatures (Shibboleth Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23884HIGH7.7
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 19, 2026
CVE-2026-23883HIGH7.7
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 19, 2026
CVE-2026-23534HIGH7.7
  • Linux DebianLinux Debian
  • freerdp-devel
NoNoJan 19, 2026
CVE-2026-23533HIGH7.7
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 19, 2026
CVE-2026-23732MEDIUM5.5
  • Linux DebianLinux Debian
  • freerdp-libs
NoNoJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management