Browse all 11 CVE security advisories affecting SimpleSAMLphp. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SimpleSAMLphp serves as a PHP-based solution for implementing SAML-based single sign-on across web applications. Historically, the software has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, accounting for its 11 recorded CVEs. Notable security characteristics include its widespread adoption in academic and enterprise environments, which has made it a frequent target for attackers. Major incidents often involve misconfigurations leading to unauthorized access, with several critical RCE vulnerabilities discovered between 2018-2022 that allowed attackers to execute arbitrary code on affected servers. The project maintains regular security updates, but legacy deployments remain vulnerable.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-27773 | SimpleSAMLphp SAML2 library has incorrect signature verification for HTTP-Redirect binding — saml2CWE-347 | 8.6 | High | 2025-03-11 |
| CVE-2024-52806 | SimpleSAMLphp SAML2 has an XXE in parsing SAML messages — saml2CWE-611 | 8.3 | High | 2024-12-02 |
This page lists every published CVE security advisory associated with SimpleSAMLphp. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.