Description
The web application uses SAML. The web application's SAML Consumer Service doesn't check a SAML Response signature when Signature element is removed.
An authenticated attacker may be able to use it to escalate privileges to a high privileged user or to takeover accounts of other users in the application.
Remediation
Change configuration of the SAML service to require a valid signature for SAML Response
References
Related Vulnerabilities
Improper Authorization in Confluence Server and Data Center (CVE-2023-22518)
WordPress Plugin Jigoshop-Store Toolkit Privilege Escalation (1.3.7)
WordPress Plugin WooCommerce Customers Manager Privilege Escalation (26.4)
VirtueMart access control bypass
WordPress Plugin Travel Management Privilege Escalation (1.5)