Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7788 | Fleet has SAML authentication vulnerability due to improper SAML response validation |
Github GHSA |
GHSA-52jx-g6m5-h735 | Fleet has SAML authentication vulnerability due to improper SAML response validation |
Thu, 06 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1. | |
| Title | SAML authentication vulnerability due to improper SAML response validation | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-06T19:29:47.248Z
Reserved: 2025-02-26T18:11:52.306Z
Link: CVE-2025-27509
Updated: 2025-03-06T19:29:28.409Z
Status : Deferred
Published: 2025-03-06T19:15:27.973
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-27509
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:10Z
EUVD
Github GHSA