Service Provider Shibboleth Service Provider

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Shibboleth Service Provider.

By the Year

In 2026 there have been 0 vulnerabilities in Shibboleth Service Provider. Last year, in 2025 Service Provider had 1 security vulnerability published. Right now, Service Provider is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 1 9.10
2024 0 0.00
2023 1 7.30
2022 0 0.00
2021 2 6.40
2020 0 0.00
2019 1 0.00

It may take a day or so for new Service Provider vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Shibboleth Service Provider Security Vulnerabilities

Blind SQLi in Shibboleth SP 3.5.0 Replay Cache via ODBC & SQLString
CVE-2025-9943 9.1 - Critical - September 10, 2025

An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service. An unauthenticated attacker can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database, if the database connection is configured to use the ODBC plugin. The vulnerability arises from insufficient escaping of single quotes in the class SQLString (file odbc-store.cpp, lines 253-271). This issue affects Shibboleth Service Provider through 3.5.0.

SQL Injection

Shibboleth SP <3.4.1: Insecure ACLs Enable DLL Planting for Priv Esc
CVE-2023-22947 7.3 - High - January 11, 2023

Insecure folder permissions in the Windows installation path of Shibboleth Service Provider (SP) before 3.4.1 allow an unprivileged local attacker to escalate privileges to SYSTEM via DLL planting in the service executable's folder. This occurs because the installation goes under C:\opt (rather than C:\Program Files) by default. NOTE: the vendor disputes the significance of this report, stating that "We consider the ACLs a best effort thing" and "it was a documentation mistake."

DLL preloading

Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature
CVE-2021-31826 7.5 - High - April 27, 2021

Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature. The flaw is exploitable (for a daemon crash) on systems not using this feature if a crafted cookie is supplied.

NULL Pointer Dereference

Shibboleth Service Provider before 3.2.1
CVE-2021-28963 5.3 - Medium - March 22, 2021

Shibboleth Service Provider before 3.2.1 allows content injection because template generation uses attacker-controlled parameters.

Injection

Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file
CVE-2019-19191 - November 21, 2019

Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Shibboleth Service Provider or by Shibboleth? Click the Watch button to subscribe.

Shibboleth
Vendor

subscribe