You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SITE-4575: Update SimpleSAMLphp security requirements to 2.3.7. (#402)
updates the SimpleSAMLphp security requirements to recommend version 2.3.7 as
the minimum secure version, while maintaining 2.0.0 as the critical security
threshold for CVE-2023-26881
@@ -40,6 +40,8 @@ If you're connecting directly to an existing IdP, you should use the bundled One
40
40
41
41
If you have more complex authentication needs, then you can also use a SimpleSAMLphp installation running in the same environment. These settings are not configurable through the WordPress backend; they'll need to be defined with a filter. And, if you have a filter in place, the WordPress backend settings will be removed.
42
42
43
+
**Note:** A security vulnerability was found in SimpleSAMLphp versions 2.0.0 and below. It is highly recommended if you are using SimpleSAMLphp with WP SAML Auth that you update your SimpleSAMLphp library to 2.4.0 or above. (See [CVE-2025-27773](https://nvd.nist.gov/vuln/detail/CVE-2025-27773) and [The SimpleSAMLphp SAML2 library incorrectly verifies signatures for HTTP-Redirect bindings](https://github.com/advisories/GHSA-46r4-f8gj-xg56) for more information.)
44
+
43
45
Additional explanation of each setting can be found in the code snippet below.
44
46
45
47
To install SimpleSAMLphp locally for testing purposes, the [Identity Provider QuickStart](https://simplesamlphp.org/docs/stable/simplesamlphp-idp) is a good place to start. On Pantheon, the SimpleSAMLphp web directory needs to be symlinked to `~/code/simplesaml` to be properly handled by Nginx. [Read the docs](https://pantheon.io/docs/shibboleth-sso/) for more details about configuring SimpleSAMLphp on Pantheon.
@@ -201,6 +203,28 @@ If you need to adapt authentication behavior based on the SAML response, you can
201
203
return $ret;
202
204
}, 10, 2 );
203
205
206
+
If you have installed SimpleSAMLphp to a non-default path, you can set that path via the `wp_saml_auth_simplesamlphp_path_array` filter. By default, it is assumed that SimpleSAMLphp is installed into one of the following paths:
You can also define an explicit path to the SimpleSAMLphp autoloader file (defaults to the `lib/_autoload.php` file under the SimpleSAMLphp path) with the `wp_saml_auth_ssp_autoloader` filter.
This plugin implements a variety of [WP-CLI](https://wp-cli.org) commands. All commands are grouped into the `wp saml-auth` namespace.
@@ -233,6 +257,16 @@ See [CONTRIBUTING.md](https://github.com/pantheon-systems/wp-saml-auth/blob/mast
233
257
### Reporting Security Bugs
234
258
Please report security bugs found in the WP SAML Auth plugin's source code through the [Patchstack Vulnerability Disclosure Program](https://patchstack.com/database/vdp/wp-saml-auth). The Patchstack team will assist you with verification, CVE assignment, and notify the developers of this plugin.
235
259
260
+
## Security Requirements
261
+
262
+
### SimpleSAMLphp Version
263
+
264
+
If you're using the SimpleSAMLphp connection type:
265
+
-**Critical Security Requirement:** Version 2.0.0 or later is required to fix CVE-2023-26881 (XML signature validation bypass vulnerability).
266
+
-**Recommended Security Requirement:** Version 2.3.7 or later is recommended for additional security fixes.
267
+
- Authentication will be blocked for versions below 2.0.0 when "Enforce Security Requirements" is enabled.
268
+
- It's always recommended to use the latest stable version of SimpleSAMLphp for security and compatibility.
269
+
236
270
## Frequently Asked Questions ##
237
271
238
272
### Can I update an existing WordPress user's data when they log back in? ###
@@ -272,13 +306,20 @@ There is no third step. Because SimpleSAMLphp loads WordPress, which has WP Nati
272
306
273
307
## Upgrade Notice ##
274
308
309
+
### 2.2.0 ###
310
+
WP SAML Auth 2.2.0 requires WordPress version 6.4 or later.
311
+
312
+
SimpleSAMLphp recommended version is 2.3.7 or later for `simplesamlphp` SAML authentication type. With "Enforce Security Requirements" enabled, SimpleSAMLphp versions below 2.0.0 will be blocked. 2.0.0 or later is required to fix CVE-2023-26881 (XML signature validation bypass vulnerability).
313
+
275
314
### 2.0.0 ###
276
315
Minimum supported PHP version is 7.3.
277
316
278
317
## Changelog ##
279
318
280
-
### 2.1.5-dev ###
319
+
### 2.2.0-dev ###
281
320
* Add a hook to modify returned attributes. [[#379](https://github.com/pantheon-systems/wp-saml-auth/pull/379/)] (props @anthonybaxter-uwu)
321
+
* Updates [`onelogin/php-saml`](https://github.com/SAML-Toolkits/php-saml) to 4.2.0. [[#402](https://github.com/pantheon-systems/wp-saml-auth/pull/402/)]
322
+
* Adds warnings and the option to disable SAML when using a vulnerable version of simplesamlphp [[#402](https://github.com/pantheon-systems/wp-saml-auth/pull/402/)]
282
323
283
324
### 2.1.4 (November 27, 2023) ###
284
325
* Fix typo in the label for the certificate path [[#352](https://github.com/pantheon-systems/wp-saml-auth/pull/352)]
Feature: Admin Notice for SimpleSAMLphp 1.18 Vulnerability
2
+
In order to ensure administrators are aware of critical security issues
3
+
As a site administrator
4
+
I need to see an admin notice regarding the SimpleSAMLphp vulnerability
5
+
6
+
Scenario: Admin user sees the SimpleSAMLphp vulnerability notice
7
+
Given I log in as an admin
8
+
Then I should be on "/wp-admin/"
9
+
And I should see "Security Alert:" in the "div.notice.notice-error[data-slug='wp-saml-auth'][data-type='simplesamlphp-critical-vulnerability']" element
10
+
And I should see "The SimpleSAMLphp version used by the WP SAML Auth plugin (1.18.4) has a critical security vulnerability (CVE-2023-26881). Please update to version 2.0.0 or later. Learn more." in the "div.notice.notice-error[data-slug='wp-saml-auth'][data-type='simplesamlphp-critical-vulnerability'] p" element
11
+
And I go to "/wp-admin/options-general.php"
12
+
Then I should see "Security Alert:" in the "div.notice.notice-error[data-slug='wp-saml-auth'][data-type='simplesamlphp-critical-vulnerability']" element
13
+
And I should see "The SimpleSAMLphp version used by the WP SAML Auth plugin (1.18.4) has a critical security vulnerability (CVE-2023-26881)" in the "div.notice.notice-error[data-slug='wp-saml-auth'] p" element
0 commit comments