JustAppSec
Back to news

SAML assertion bypass lets attackers mint Cloud Foundry UAA tokens

1 min readPublished 16 Apr 2026Updated 16 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A SAML 2.0 bearer assertion validation flaw in Cloud Foundry UAA can let remote attackers mint access tokens for arbitrary users when bearer assertions are enabled.

What happened

Cloud Foundry UAA (User Account and Authentication) is the identity and token service used by Cloud Foundry to issue and validate credentials for UAA-protected components and applications.

CVE-2026-22734 describes an authentication bypass / token spoofing issue triggered when SAML 2.0 bearer assertions are enabled for a client. In this configuration, UAA can accept SAML 2.0 bearer assertions that are neither signed nor encrypted, allowing an attacker to obtain a token for any user and use it to access UAA-protected systems.

This is a high-impact appsec problem because it targets the platform’s authorization boundary: once an attacker can mint tokens, downstream services may treat requests as legitimately authenticated, turning a single config-dependent weakness into broad lateral access.

Who is impacted

  • Cloud Foundry environments where a UAA client has SAML 2.0 bearer assertions enabled.
  • Impacted version ranges vary by component and how deployments track UAA releases.
ComponentAffected versions (per public records)Notes
UUAv77.21.0 through v78.8.0CVE record scope for the UUA product line.
uaa_releasev77.30.0 through v78.7.0 (inclusive)Cloud Foundry advisory’s affected uaa_release range.
cf-deploymentv48.7.0 through v54.14.0 (inclusive)Cloud Foundry advisory’s affected deployment range.

What to do now

  • Follow vendor remediation guidance and apply the recommended upgrades for your packaging/deployment line.

    "Upgrade uaa_release versions to v78.9.0 or greater" "Upgrade cf-deployment version to v55.0.0 or greater"

  • Inventory UAA clients and configurations to determine where SAML 2.0 bearer assertions are enabled, and prioritize patching those environments first.
  • Treat this as potential credential/token compromise if exposure is suspected: review UAA token issuance/authentication logs and rotate credentials (and invalidate tokens where feasible) according to your incident response playbooks.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.