NA
CVSSv3

CVE-2025-25292

CVSSv4: 8.8 | CVSSv3: NA | CVSSv2: NA | VMScore: 980 | EPSS: 0.00655 | KEV: Not Included
Published: 12/03/2025 Updated: 15/03/2025

Vulnerability Summary

Authentication Bypass Vulnerability in ruby-saml via XML Signature Wrapping Attack

A vulnerability exists in ruby-saml, a security assertion markup language (SAML) single sign-on (SSO) library for Ruby. Prior to versions 1.12.4 and 1.18.0, the library has an authentication bypass issue caused by different XML parsing behaviors between ReXML and Nokogiri. These parsers can generate distinct document structures from the same XML input, which enables an attacker to perform a Signature Wrapping attack. This vulnerability potentially allows authentication bypass, compromising the security of the SSO process. The developers addressed the problem in versions 1.12.4 and 1.18.0 by implementing a patch to resolve the parsing discrepancies.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

saml-toolkits ruby-saml

Vendor Advisories

Debian Bug report logs - #1100441 ruby-saml: CVE-2025-25291 CVE-2025-25292 CVE-2025-25293 Package: src:ruby-saml; Maintainer for src:ruby-saml is Debian Ruby Team <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 13 Mar 2025 21:57:02 UTC Severity: ...

Recent Articles

GitLab patches critical authentication bypass vulnerabilities
BleepingComputer • Bill Toulas • 13 Mar 2025

GitLab patches critical authentication bypass vulnerabilities By Bill Toulas March 13, 2025 12:13 PM 0 GitLab released security updates for Community Edition (CE) and Enterprise Edition (EE), fixing nine vulnerabilities, among which two critical severity ruby-saml library authentication bypass flaws. All flaws were addressed in GitLab CE/EE versions 17.7.7, 17.8.5, and 17.9.2, while all versions before those are vulnerable.  GitLab.com is already patched, and GitLab Dedicated customers will...