<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Samlify (&lt; 2.13.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/samlify--2.13.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 17:15:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/samlify--2.13.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>samlify XML Injection Vulnerability Allows Privilege Escalation (CVE-2026-46490)</title><link>https://feed.craftedsignal.io/briefs/2026-05-samlify-xml-injection/</link><pubDate>Thu, 21 May 2026 17:15:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-samlify-xml-injection/</guid><description>samlify's template substitution only escapes attribute contexts, leaving values inserted into element text (e.g., `&lt;saml:AttributeValue&gt;`) unescaped, allowing a normal user to inject XML markup into an attribute value and add new `&lt;saml:Attribute&gt;` elements inside the signed assertion, leading to privilege escalation when attributes are used for authorization (CVE-2026-46490).</description><content:encoded><![CDATA[<p>A vulnerability in samlify versions prior to 2.13.0 allows for XML injection in SAML attribute values. The <code>replaceTagsByValue()</code> function in <code>src/libsaml.ts</code> only escapes placeholders when preceded by a quote (attribute context) but does not escape element text. This allows a normal user to inject arbitrary XML markup into an attribute value (e.g., email, name) and add new <code>&lt;saml:Attribute&gt;</code> elements inside the signed assertion. The Identity Provider (IdP) then signs the tampered assertion, and the Service Provider (SP) accepts the injected attributes as trusted. This issue, identified as CVE-2026-46490, enables privilege escalation if attributes are used for authorization decisions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a SAML integration using a vulnerable version of samlify.</li>
<li>The attacker crafts a malicious input containing XML markup designed to inject a new attribute (e.g., &lsquo;role=admin&rsquo;) into the SAML assertion. This input is typically injected via a user-controlled field such as email or name.</li>
<li>The attacker authenticates with the Identity Provider (IdP), triggering the SAML assertion generation process.</li>
<li>The IdP&rsquo;s <code>replaceTagsByValue()</code> function fails to properly escape the malicious XML markup within the <code>&lt;saml:AttributeValue&gt;</code> tag.</li>
<li>The IdP signs the tampered SAML assertion, including the attacker-injected attribute.</li>
<li>The IdP sends the modified SAML assertion to the Service Provider (SP).</li>
<li>The SP uses <code>sp.parseLoginResponse()</code> to parse the SAML assertion. Due to the injected attribute being signed by the IdP, the SP trusts the injected attribute.</li>
<li>The attacker gains elevated privileges within the SP application because the SP uses the injected attribute (e.g., &lsquo;role=admin&rsquo;) for authorization decisions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-46490) allows attackers to escalate privileges within applications that rely on SAML for authentication and authorization. A normal user can inject arbitrary attributes (e.g., <code>role=admin</code>) into a signed assertion and have them parsed by <code>sp.parseLoginResponse()</code>. This can lead to unauthorized access to sensitive data, modification of critical system settings, or other malicious activities, depending on how the application uses SAML attributes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to samlify version 2.13.0 or later to remediate the XML injection vulnerability (CVE-2026-46490).</li>
<li>Implement server-side input validation and sanitization to prevent XML injection in SAML attribute values.</li>
<li>Deploy the Sigma rule <code>Detect Samlify XML Injection Attempt in SAML Response</code> to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xml-injection</category><category>privilege-escalation</category><category>saml</category></item></channel></rss>