CVE-2026-41670: Admidio SAML IdP Bypass Exposes User Data
The National Vulnerability Database has detailed CVE-2026-41670, a critical vulnerability in Admidio’s open-source user management solution. Prior to version 5.0.9, the SAML Identity Provider (IdP) implementation within Admidio’s Single Sign-On (SSO) module fails to properly validate the AssertionConsumerServiceURL from incoming SAML authentication requests. This allows an attacker to manipulate the SAML response destination.
An attacker, knowing only the Entity ID of a registered Service Provider (SP) client, can craft a malicious SAML AuthnRequest. This forces the Admidio IdP to send the signed SAML response, containing sensitive user attributes like login names, email addresses, roles, and profile fields, to an attacker-controlled URL instead of the legitimate SP. This bypass, rated with a CVSS score of 8.2 (HIGH), highlights a severe risk of information disclosure.
This flaw, categorized under CWE-20 (Improper Input Validation) and CWE-601 (Open Redirect), means that without proper patching, any organization using Admidio for user management is at risk of having their user identities compromised. Admidio has addressed this critical issue in version 5.0.9, and immediate upgrade is essential to mitigate the threat.
What This Means For You
- If your organization uses Admidio for identity management, you are directly exposed to CVE-2026-41670. Check your Admidio instance version immediately. If it's prior to 5.0.9, you MUST upgrade to version 5.0.9 or later without delay. This vulnerability allows for unauthorized data exfiltration of user identities, which can lead to further account takeovers and broader compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41670: Admidio SAML IdP AssertionConsumerServiceURL Manipulation
title: CVE-2026-41670: Admidio SAML IdP AssertionConsumerServiceURL Manipulation
id: scw-2026-05-07-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-41670 by observing SAML AuthnRequest messages that contain a manipulated AssertionConsumerServiceURL parameter. This indicates an attacker is trying to redirect SAML responses to an arbitrary URL, potentially exfiltrating user data.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41670/
tags:
- attack.initial_access
- attack.t1566.003
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/saml/idp/metadata.php'
cs-uri-query|contains:
- 'AssertionConsumerServiceURL='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41670 | Information Disclosure | Admidio SSO module SAML IdP implementation |
| CVE-2026-41670 | Information Disclosure | Admidio versions prior to 5.0.9 |
| CVE-2026-41670 | Information Disclosure | SAML AuthnRequest with arbitrary AssertionConsumerServiceURL |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 07, 2026 at 07:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.