Browse all 11 CVE security advisories affecting simplesamlphp. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SimpleSAMLphp serves as a PHP-based solution for implementing SAML-based single sign-on across web applications. Historically, the software has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, accounting for its 11 recorded CVEs. Notable security characteristics include its widespread adoption in academic and enterprise environments, which has made it a frequent target for attackers. Major incidents often involve misconfigurations leading to unauthorized access, with several critical RCE vulnerabilities discovered between 2018-2022 that allowed attackers to execute arbitrary code on affected servers. The project maintains regular security updates, but legacy deployments remain vulnerable.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32600 | xml-security is Missing AES-GCM Authentication Tag Validation on Encrypted Nodes Allows for Unauthorized Decryption — xml-securityCWE-354 | 8.2 | High | 2026-03-13 |
| CVE-2023-49087 | Validation of SignedInfo — xml-securityCWE-345 | 6.8 | Medium | 2023-11-30 |
This page lists every published CVE security advisory associated with simplesamlphp. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.