CVE-2022-37011
CRITICALMendix SAML <1.17.0, <2.3.0, <3.3.0 - Auth Bypass
Title source: llmDescription
A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0). Affected versions of the module insufficiently protect from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. For compatibility reasons, fix versions still contain this issue, but only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled.
Scores
CVSS v3
9.8
EPSS
0.0091
EPSS Percentile
75.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-294
Status
published
Affected Products (1)
mendix/saml
< 1.17.0
Timeline
Published
Sep 13, 2022
Tracked Since
Feb 18, 2026