### [CVE-2025-47949](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47949) ![](https://img.shields.io/static/v1?label=Product&message=samlify&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%202.10.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature&color=brightgreen) ### Description samlify is a Node.js library for SAML single sign-on. A Signature Wrapping attack has been found in samlify prior to version 2.10.0, allowing an attacker to forge a SAML Response to authenticate as any user. An attacker would need a signed XML document by the identity provider. Version 2.10.0 fixes the issue. ### POC #### Reference No PoCs from references. #### Github - https://github.com/tanjiti/sec_profile