CVE-2026-41669: Admidio SAML Signature Bypass Puts User Management at Risk
A critical flaw, CVE-2026-41669, has been identified in Admidio, an open-source user management solution. According to the National Vulnerability Database, prior to version 5.0.9, Admidio’s SAML Identity Provider implementation failed to properly validate signatures on both AuthnRequests and LogoutRequests. The underlying validateSignature() method returned error strings on failure, but developers incorrectly assumed it would throw exceptions, leading to the return value being discarded at both call sites.
This oversight renders the smc_require_auth_signed configuration option completely ineffective. Attackers can process unsigned or invalidly-signed SAML requests as if they were legitimate. The National Vulnerability Database has assigned this vulnerability a CVSS score of 8.2 (HIGH), indicating a significant risk. The root cause is a CWE-347, improper verification of cryptographic signature.
While specific affected products beyond Admidio itself were not detailed by the National Vulnerability Database, any organization leveraging Admidio’s SAML Identity Provider for user authentication is exposed. The impact is a complete bypass of SAML signature requirements, enabling unauthorized access or session manipulation if an attacker can intercept and modify SAML assertions.
What This Means For You
- If your organization uses Admidio with SAML for identity management, this vulnerability is a severe bypass of your authentication integrity. Attackers can craft unsigned or invalidly-signed SAML requests that the system will process as valid. You need to immediately verify your Admidio version and patch to 5.0.9 or higher to ensure SAML signature validation is enforced. This isn't theoretical; it's a direct route to unauthorized access.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41669: Admidio SAML Signature Bypass - Unsigned AuthnRequest
title: CVE-2026-41669: Admidio SAML Signature Bypass - Unsigned AuthnRequest
id: scw-2026-05-07-ai-1
status: experimental
level: critical
description: |
Detects potential exploitation of CVE-2026-41669 by identifying Admidio SAML AuthnRequests that are missing a valid signature. The vulnerability allows processing of unsigned or invalidly-signed SAML requests, enabling an attacker to bypass authentication mechanisms.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41669/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/saml/sp/metadata.php'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'SAMLRequest='
selection_unsigned:
cs-uri-query|contains:
- 'Signature=' # This is the key: a SAMLRequest without a valid signature
condition: selection AND selection_unsigned
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41669 | Auth Bypass | Admidio SAML Identity Provider implementation prior to version 5.0.9 |
| CVE-2026-41669 | Auth Bypass | Admidio vulnerable function validateSignature() return value discarded |
| CVE-2026-41669 | Auth Bypass | Admidio vulnerable call site handleSSORequest() line 418 |
| CVE-2026-41669 | Auth Bypass | Admidio vulnerable call site handleSLORequest() line 613 |
| CVE-2026-41669 | Misconfiguration | Admidio smc_require_auth_signed configuration option ineffective |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 07, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.