Browse all 11 CVE security advisories affecting simplesamlphp. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SimpleSAMLphp serves as a PHP-based solution for implementing SAML-based single sign-on across web applications. Historically, the software has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, accounting for its 11 recorded CVEs. Notable security characteristics include its widespread adoption in academic and enterprise environments, which has made it a frequent target for attackers. Major incidents often involve misconfigurations leading to unauthorized access, with several critical RCE vulnerabilities discovered between 2018-2022 that allowed attackers to execute arbitrary code on affected servers. The project maintains regular security updates, but legacy deployments remain vulnerable.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-5301 | Information disclosure of source code in SimpleSAMLphp — simplesamlphpCWE-200 | 3.0 | Low | 2020-04-21 |
| CVE-2020-5226 | Cross-site scripting in SimpleSAMLphp — SimpleSAMLphpCWE-79 | 4.4 | Medium | 2020-01-24 |
| CVE-2020-5225 | Log injection in SimpleSAMLphp — SimpleSAMLphpCWE-532 | 4.4 | Medium | 2020-01-24 |
| CVE-2011-4625 | SimpleSAMLphp 安全漏洞 — simplesamlphp | 7.5 | - | 2019-11-06 |
This page lists every published CVE security advisory associated with simplesamlphp. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.