Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46784: CWE-401: Improper Release of Memory Before Removing Last Reference in Entr'ouvert Lasso

0
High
VulnerabilityCVE-2025-46784cvecve-2025-46784cwe-401
Published: Wed Nov 05 2025 (11/05/2025, 14:56:57 UTC)
Source: CVE Database V5
Vendor/Project: Entr'ouvert
Product: Lasso

Description

A denial of service vulnerability exists in the lasso_node_init_from_message_with_format functionality of Entr'ouvert Lasso 2.5.1. A specially crafted SAML response can lead to a memory depletion, resulting in denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/12/2025, 15:23:52 UTC

Technical Analysis

CVE-2025-46784 is a vulnerability classified under CWE-401 (Improper Release of Memory Before Removing Last Reference) affecting Entr'ouvert Lasso version 2.5.1, specifically in the function lasso_node_init_from_message_with_format. Lasso is a library used for SAML (Security Assertion Markup Language) processing, commonly employed in federated identity and single sign-on (SSO) solutions. The vulnerability occurs when the function processes a specially crafted SAML response that leads to improper memory handling, causing memory depletion. This memory exhaustion results in denial of service (DoS), as the application may crash or become unresponsive due to resource exhaustion. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting the network vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). No patches were linked at the time of publication, and no known exploits are reported in the wild. The vulnerability highlights the importance of secure memory management in parsing complex XML-based protocols like SAML, where malformed inputs can lead to resource exhaustion attacks.

Potential Impact

For European organizations, the primary impact of CVE-2025-46784 is the potential disruption of authentication services relying on Entr'ouvert Lasso 2.5.1 for SAML processing. Denial of service in identity federation components can lead to widespread access issues, preventing legitimate users from authenticating and accessing critical applications. This can affect business continuity, especially in sectors with high dependency on SSO such as government, finance, healthcare, and large enterprises. The unavailability of authentication services may also increase helpdesk workload and operational costs. Since the vulnerability does not impact confidentiality or integrity, data breaches are unlikely; however, service outages can indirectly affect compliance with regulations like GDPR if service availability is critical. The ease of exploitation without authentication or user interaction means attackers can launch automated attacks at scale, potentially targeting multiple organizations simultaneously. The lack of known exploits currently provides a window for proactive mitigation before active exploitation emerges.

Mitigation Recommendations

1. Monitor Entr'ouvert's official channels for patches addressing CVE-2025-46784 and apply them promptly once available. 2. Implement strict input validation and sanity checks on incoming SAML responses before processing to detect and reject malformed or suspicious messages. 3. Deploy rate limiting and anomaly detection on SAML endpoints to mitigate potential flooding or memory exhaustion attacks. 4. Consider isolating or sandboxing the Lasso processing component to limit the impact of a DoS attack on the broader system. 5. Maintain up-to-date logging and monitoring to detect unusual spikes in memory usage or service crashes related to SAML processing. 6. If immediate patching is not possible, evaluate temporary mitigations such as disabling vulnerable SAML features or using alternative SAML libraries. 7. Conduct security reviews of SAML integration points and ensure secure coding practices are followed to prevent similar memory management issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-05-07T13:20:21.670Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b6825eb4434bb4f92e005

Added to database: 11/5/2025, 3:07:17 PM

Last enriched: 11/12/2025, 3:23:52 PM

Last updated: 12/20/2025, 7:55:30 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats