Description
The web application uses SAML. The web application's SAML Consumer Service uses a retired hash function for the digital signature.
An authenticated attacker may be able to use it to escalate privileges to a high privileged user or to takeover accounts of other users in the application.
Remediation
Change configuration of the SAML service to require a more secure hash function for the digital signature
References
Related Vulnerabilities
WordPress Plugin Chat-Support Board-WordPress Chat Privilege Escalation (3.3.8)
WordPress Plugin WP Job Manager Privilege Escalation (1.34.3)
Database User Has Admin Privileges
WordPress Plugin WP e-Commerce-Store Exporter Privilege Escalation (1.6.6)
WordPress plugin All in One SEO Pack privilege escalation vulnerabilities