CVE-2025-47151
Published: 05 November 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
A type confusion vulnerability, tracked as CVE-2025-47151 and associated with CWE-843, affects the lasso_node_impl_init_from_xml functionality in Entr'ouvert Lasso versions 2.5.1 and 2.8.2. The issue arises when processing a specially crafted SAML response, which can trigger the type confusion and lead to arbitrary code execution. This flaw has been assigned a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impact on confidentiality, integrity, and availability.
Remote attackers without authentication can exploit this vulnerability by sending a malformed SAML response to a vulnerable Lasso implementation. Successful exploitation enables arbitrary code execution on the target system, potentially allowing full compromise of the affected service or host.
Mitigation details and additional technical analysis are available in the Talos Intelligence advisory at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2193. Security practitioners should consult this report for patching guidance and workarounds specific to affected deployments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability allows remote unauthenticated attackers to achieve arbitrary code execution by sending a malformed SAML response to a public-facing Lasso implementation, directly mapping to exploitation of public-facing applications.