We use cookies for analytics and to serve ads. Accept to enable Google Analytics and AdSense. You can decline to stay opt-out.
Security advisories with Article + SoftwareApplication context, FAQs, and breadcrumb navigation.
Represents the advisory content with headline, dates, and author/publisher.
Anchors the affected product/application with version details.
Answers remediation, impact, and upgrade guidance.
Provides navigation context from the security hub.
Ensure every applicable required property is present in your implementation. Nested props reference their parent objects (for example, `offers.priceCurrency`).
Paste as a single script tag. Keep product details, offer data, shipping/returns, and FAQ answers in sync with the page.
[
{
"@context": "https://schema.org",
"@type": "Article",
"@id": "https://www.example.com/security/advisories/2025-01-sso-bypass#article",
"headline": "Security Advisory: SSO Bypass in Legacy SAML Flow",
"description": "We identified and fixed an SSO bypass affecting legacy SAML configs. Update to v5.12.3 or apply the mitigation.",
"datePublished": "2025-01-20",
"dateModified": "2025-01-21",
"inLanguage": "en",
"url": "https://www.example.com/security/advisories/2025-01-sso-bypass",
"author": { "@type": "Organization", "name": "Example Security Team" },
"publisher": { "@type": "Organization", "name": "Example Corp" },
"about": { "@id": "https://www.example.com/security/advisories/2025-01-sso-bypass#app" }
},
{
"@context": "https://schema.org",
"@type": "SoftwareApplication",
"@id": "https://www.example.com/security/advisories/2025-01-sso-bypass#app",
"name": "Example Identity Suite",
"applicationCategory": "Security",
"operatingSystem": "SaaS",
"softwareVersion": "5.12.2",
"offers": {
"@type": "Offer",
"url": "https://www.example.com/security/releases/5.12.3"
}
},
{
"@context": "https://schema.org",
"@type": "FAQPage",
"mainEntity": [
{
"@type": "Question",
"name": "Which versions are affected?",
"acceptedAnswer": {
"@type": "Answer",
"text": "Versions 5.10.0 through 5.12.2 with legacy SAML enabled are affected. Versions 5.12.3+ are patched."
}
},
{
"@type": "Question",
"name": "What is the fix?",
"acceptedAnswer": {
"@type": "Answer",
"text": "Upgrade to 5.12.3 or later. As a temporary mitigation, disable legacy SAML and enforce modern SSO policies."
}
},
{
"@type": "Question",
"name": "Is there any evidence of exploitation?",
"acceptedAnswer": {
"@type": "Answer",
"text": "We have no evidence of exploitation. Logs and IDS rules have been updated to detect attempts. Contact security@example.com with questions."
}
}
]
},
{
"@context": "https://schema.org",
"@type": "BreadcrumbList",
"itemListElement": [
{ "@type": "ListItem", "position": 1, "name": "Home", "item": "https://www.example.com" },
{ "@type": "ListItem", "position": 2, "name": "Security Advisories", "item": "https://www.example.com/security/advisories" },
{ "@type": "ListItem", "position": 3, "name": "SSO Bypass (2025-01)", "item": "https://www.example.com/security/advisories/2025-01-sso-bypass" }
]
}
]Include the CVE in the Article body and headline if assigned. Keep JSON-LD aligned with what’s visible on the page.
Add one SoftwareApplication object per affected product/version and link them from the Article via about.@id.