Skip to main content

Changelog

Updates, changes, and improvements at Retool.

CVE-2025-47949

A vulnerability in an open-source library, samlify, which Retool uses for SAML login implementation, allowed for account takeovers through forged SAML identity provider (IdP) assertions. In the worst case, an external threat actor could forge arbitrary assertions for a SAML IdP, potentially leading to full account takeovers within an organization. An attacker would need a signed XML document by the identity provider. Version 2.10.0 fixes the issue. This exploit requires no user interaction and an attacker could gain unauthorized access to an organization with escalated privileges.

FieldValue
Vulnerability TypeImproper Verification of Cryptographic Signature
Packagesamlify
Affected ComponentRetool organizations using SAML SSO
Attack TypeRemote
ImpactAccount Takeover
Referencehttps://nvd.nist.gov/vuln/detail/CVE-2025-47949
DiscovererAlexander Tan (ahacker1)

Fixed release versions

BranchVersions
Edge3.207.0-edge
Stable3.196.2-stable
Stable3.148.13-stable
Stable3.114.25-stable

Affected release versions

Release branchRelease versions
Edge3.111.0 to 3.203.0
3.196-stable3.196.0 to 3.196.1
3.148-stable3.148.0 to 3.148.11
3.114-stable3.114.0 to 3.114.23
< 3.111.0