Description
The web application uses SAML. The web application's SAML Consumer Service doesn't require SAML Response signature.
An authenticated attacker may be able to use it to escalate privileges to a high privileged user or to takeover accounts of other users in the application.
Remediation
Change configuration of the SAML service to require a valid signature for SAML Response
References
Related Vulnerabilities
WordPress Plugin WP e-Commerce-Store Exporter Privilege Escalation (1.6.6)
WordPress Plugin PowerPack for Beaver Builder Privilege Escalation (2.33.0)
WordPress Plugin Bulk Delete Privilege Escalation (5.5.3)
WordPress plugin All in One SEO Pack privilege escalation vulnerabilities
WordPress Plugin WP e-Commerce-Store Toolkit Privilege Escalation (2.0)