Cyber Posture

CVE-2025-47151

CriticalPublic PoC

Published: 05 November 2025

Published
05 November 2025
Modified
07 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 33.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-47151 is a critical-severity Type Confusion (CWE-843) vulnerability in Entrouvert Lasso. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 33.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the type confusion vulnerability by requiring timely patching or upgrading of the affected Lasso library versions.

prevent

Validates incoming SAML responses to block malformed XML inputs that trigger the lasso_node_impl_init_from_xml type confusion.

prevent

Implements memory protections such as ASLR and DEP to hinder arbitrary code execution from type confusion exploits.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows remote unauthenticated attackers to achieve arbitrary code execution by sending a malformed SAML response to a public-facing Lasso implementation, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A type confusion vulnerability exists in the lasso_node_impl_init_from_xml functionality of Entr'ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML response can lead to an arbitrary code execution. An attacker can send a malformed SAML response to trigger this vulnerability.

Deeper analysisAI

A type confusion vulnerability, tracked as CVE-2025-47151 and associated with CWE-843, affects the lasso_node_impl_init_from_xml functionality in Entr'ouvert Lasso versions 2.5.1 and 2.8.2. The issue arises when processing a specially crafted SAML response, which can trigger the type confusion and lead to arbitrary code execution. This flaw has been assigned a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impact on confidentiality, integrity, and availability.

Remote attackers without authentication can exploit this vulnerability by sending a malformed SAML response to a vulnerable Lasso implementation. Successful exploitation enables arbitrary code execution on the target system, potentially allowing full compromise of the affected service or host.

Mitigation details and additional technical analysis are available in the Talos Intelligence advisory at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2193. Security practitioners should consult this report for patching guidance and workarounds specific to affected deployments.

Details

CWE(s)

Affected Products

entrouvert
lasso
2.5.1, 2.8.2

CVEs Like This One

CVE-2026-24874Shared CWE-843
CVE-2025-70023Shared CWE-843
CVE-2025-65570Shared CWE-843
CVE-2026-25537Shared CWE-843
CVE-2025-53144Shared CWE-843
CVE-2026-40683Shared CWE-843
CVE-2026-21854Shared CWE-843
CVE-2026-5865Shared CWE-843
CVE-2026-4702Shared CWE-843
CVE-2025-21342Shared CWE-843

References