Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7045: CWE-306 Missing Authentication for Critical Function in cloudinfrastructureservices Cloud SAML SSO – Single Sign On Login

0
Medium
VulnerabilityCVE-2025-7045cvecve-2025-7045cwe-306
Published: Sat Sep 06 2025 (09/06/2025, 03:22:36 UTC)
Source: CVE Database V5
Vendor/Project: cloudinfrastructureservices
Product: Cloud SAML SSO – Single Sign On Login

Description

The Cloud SAML SSO plugin for WordPress is vulnerable to Identity Provider Deletion due to a missing capability check on the delete_config action of the csso_handle_actions() function in all versions up to, and including, 1.0.19. This makes it possible for unauthenticated attackers to delete any configured IdP, breaking the SSO authentication flow and causing a denial-of-service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:01:20 UTC

Technical Analysis

CVE-2025-7045 is a vulnerability identified in the Cloud SAML SSO plugin for WordPress, specifically affecting all versions up to and including 1.0.19. The root cause is a missing capability check on the delete_config action within the csso_handle_actions() function, which is responsible for handling administrative actions related to SAML Identity Providers (IdPs). Due to this missing authentication, unauthenticated remote attackers can invoke the delete_config action to remove any configured IdP. This deletion disrupts the SAML Single Sign-On authentication flow, effectively causing a denial-of-service (DoS) condition by preventing users from authenticating via SSO. The vulnerability does not impact confidentiality but affects integrity and availability, as attackers can alter critical configuration without authorization. The CVSS v3.1 score of 6.5 reflects a medium severity, with attack vector being network-based, no privileges or user interaction required, and an impact on integrity and availability. No patches or exploits are currently publicly available, but the vulnerability is straightforward to exploit given the lack of authentication checks. This issue highlights the importance of enforcing strict access controls on critical plugin functions that manage authentication configurations.

Potential Impact

The primary impact of CVE-2025-7045 is a denial-of-service condition on the SAML Single Sign-On authentication mechanism. Organizations relying on the Cloud SAML SSO plugin for user authentication may experience disruption in user access, potentially locking out legitimate users and administrators. This can lead to operational downtime, increased support costs, and potential loss of productivity. While the vulnerability does not expose sensitive data directly, the inability to authenticate can indirectly affect business continuity and user trust. Attackers could leverage this flaw to target high-value environments where SAML SSO is critical, such as enterprise portals, cloud services, and internal applications. The ease of exploitation without authentication or user interaction increases the risk of automated attacks or mass exploitation attempts. Organizations with large user bases or critical reliance on SSO are particularly vulnerable to service disruption and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-7045, organizations should immediately audit their use of the Cloud SAML SSO plugin and restrict access to administrative endpoints handling SAML configurations. Until an official patch is released, implement web application firewall (WAF) rules to block unauthorized requests targeting the delete_config action or csso_handle_actions() function. Employ strict IP whitelisting and multi-factor authentication for administrative access to WordPress dashboards. Monitor logs for suspicious deletion attempts or configuration changes related to SAML IdPs. Consider temporarily disabling the plugin if SSO is not critical or switching to alternative SSO solutions with verified security. Once patches become available, apply them promptly and verify that capability checks are enforced. Regularly review plugin permissions and update WordPress and plugins to the latest versions to reduce exposure to similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-03T10:29:57.334Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bbabc7844ddfa4289c969e

Added to database: 9/6/2025, 3:34:31 AM

Last enriched: 2/26/2026, 4:01:20 PM

Last updated: 3/25/2026, 1:24:33 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses