CVE-2025-9943
Linux Debian vulnerability analysis and mitigation

Overview

An SQL injection vulnerability (CVE-2025-9943) was discovered in the Shibboleth Service Provider (SP) through version 3.5.0. The vulnerability exists in the 'ID' attribute of the SAML response when the replay cache is configured to use an SQL database as storage service. The issue was discovered on June 16, 2025, by Florian Stuhlmann from SEC Consult Vulnerability Lab and was publicly disclosed on September 11, 2025 (SEC Consult, Shibboleth Advisory).

Technical details

The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271) when using the ODBC plugin. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database if the database connection is configured to use the ODBC plugin. The vulnerability has been assigned a CVSS v3.1 base score of 9.1 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) (SEC Consult).

Impact

The vulnerability allows unauthenticated attackers to extract arbitrary data from the database with the rights of the database user. The severity is considered moderate to high for organizations using the ODBC plugin, while there is no impact for those not using it (Shibboleth Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Shibboleth Service Provider version 3.5.1. Organizations are recommended to update to this version immediately. As a workaround, users can migrate to any other non-ODBC StorageService for the ReplayCache. The fix can be applied by simply restarting the shibd process, as the affected code runs only within that process (Shibboleth Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-9943CRITICAL9.1
  • Linux DebianLinux Debian
  • shibboleth-sp
NoYesSep 10, 2025
CVE-2025-7709MEDIUM6.9
  • Linux DebianLinux Debian
  • sqlite3
NoNoSep 08, 2025
CVE-2025-9714MEDIUM6.2
  • Linux DebianLinux Debian
  • libxml2-static
NoYesSep 10, 2025
CVE-2025-40929MEDIUM5.6
  • Linux DebianLinux Debian
  • perl-cpanel-json-xs
NoYesSep 08, 2025
CVE-2025-8277LOW3.1
  • Linux DebianLinux Debian
  • libssh2-devel
NoNoSep 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management