CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-27509: SAML authentication vulnerability due to improper SAML response validation

9.3 CVSS

Description

fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1.

Classification

CVE ID: CVE-2025-27509

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.3

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem Types

CWE-285: Improper Authorization

Affected Products

Vendor: fleetdm

Product: fleet

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.09% (probability of being exploited)

EPSS Percentile: 23.98% (scored less or equal to compared to others)

EPSS Date: 2025-04-04 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: true

References

https://nvd.nist.gov/vuln/detail/CVE-2025-27509
https://github.com/fleetdm/fleet/security/advisories/GHSA-52jx-g6m5-h735
https://github.com/fleetdm/fleet/commit/718c95e47ad010ad6b8ceb3f3460e921fbfc53bb

Timeline