<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41670 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41670/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41670/feed.xml" rel="self" type="application/rss+xml"/><item><title>Admidio SAML Assertion Consumer Service (ACS) URL Validation Bypass</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-admidio-saml-acs-bypass/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-admidio-saml-acs-bypass/</guid><description>Admidio's SAML IdP implementation in its SSO module is vulnerable to sending SAML responses to unvalidated Assertion Consumer Service URLs, allowing an attacker to craft a SAML AuthnRequest with an arbitrary AssertionConsumerServiceURL, causing the IdP to send the signed SAML response, containing user identity attributes, to an attacker-controlled URL, enabling impersonation of the victim user on the legitimate SP by replaying the SAML assertion.</description><content:encoded><![CDATA[<p>A vulnerability exists in Admidio&rsquo;s SAML IdP implementation within the SSO module (versions 5.0.8 and earlier) that allows for bypassing Assertion Consumer Service (ACS) URL validation. The IdP uses the <code>AssertionConsumerServiceURL</code> value directly from incoming SAML AuthnRequest messages as the destination for the SAML response without verifying it against the registered <code>smc_acs_url</code> for the corresponding service provider client. An attacker can exploit this by crafting a SAML AuthnRequest with the Entity ID of a registered SP client and an attacker-controlled <code>AssertionConsumerServiceURL</code>. This causes the IdP to send the signed SAML response, containing sensitive user identity attributes (login name, email, roles, profile fields), to a URL controlled by the attacker. The default configuration does not require signed AuthnRequests, simplifying exploitation to only needing the SP&rsquo;s Entity ID.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the Entity ID of a registered SAML service provider (SP) client within the Admidio IdP. This is often publicly available from the SP&rsquo;s metadata endpoint.</li>
<li>The attacker crafts a malicious SAML AuthnRequest. The AuthnRequest includes the legitimate SP Entity ID as the Issuer, but sets the <code>AssertionConsumerServiceURL</code> to a URL controlled by the attacker (e.g., <code>https://attacker.test/steal-saml</code>).</li>
<li>The attacker sends the crafted SAML AuthnRequest to Admidio&rsquo;s SSO endpoint (<code>/modules/sso/index.php/saml/sso</code>) using the HTTP-POST binding, typically by tricking a logged-in user into accessing a webpage containing an auto-submitting form.</li>
<li>Admidio&rsquo;s SSO module receives the AuthnRequest. If signature validation is not enforced for the SP, the request proceeds without signature verification.</li>
<li>If the user is already authenticated with the Admidio IdP, the IdP generates a signed SAML response containing the user&rsquo;s identity and attributes. The destination of the SAML response is set to the attacker-controlled <code>AssertionConsumerServiceURL</code> taken directly from the AuthnRequest.</li>
<li>Admidio renders an auto-submitting HTML form in the victim&rsquo;s browser, which POSTs the signed SAML response to the attacker&rsquo;s URL (<code>https://attacker.test/steal-saml</code>).</li>
<li>The attacker&rsquo;s server receives the SAML response, extracting the user&rsquo;s login name, email, full name, roles, and any other profile fields included in the assertion.</li>
<li>The attacker replays the stolen SAML assertion to the legitimate SP to authenticate as the victim, gaining unauthorized access to the SP application and its resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to steal user identities and impersonate victims on legitimate service provider applications. This leads to unauthorized access to user accounts and potential access to sensitive data and resources within those applications. The scope change enables impersonation across separate service provider applications. The vulnerability is exploitable without requiring knowledge of cryptographic keys if <code>smc_require_auth_signed</code> is not enabled, making it easier to exploit. All versions of Admidio up to and including 5.0.8 are affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch described in GHSA-p9w9-87c8-m235 by upgrading to a version of Admidio greater than 5.0.8.</li>
<li>As a temporary mitigation, enable <code>smc_require_auth_signed</code> and <code>smc_validate_signatures</code> for all SAML clients to enforce signature validation, mitigating attacks from unauthenticated sources.</li>
<li>Monitor web server logs for POST requests to the Admidio SSO endpoint (<code>/modules/sso/index.php/saml/sso</code>) with suspicious <code>SAMLRequest</code> parameters containing attacker-controlled <code>AssertionConsumerServiceURL</code> values, which can be detected using the &ldquo;Admidio SAML AuthnRequest ACS URL Override&rdquo; Sigma rule.</li>
<li>Monitor network traffic for connections to attacker-controlled URLs, such as <code>https://attacker.test/steal-saml</code>, which may indicate successful exploitation and the exfiltration of SAML responses as listed in the IOC table.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>saml</category><category>sso</category><category>acs-bypass</category><category>admidio</category><category>cve-2026-41670</category></item></channel></rss>