Home

Description

The ruby-saml library is for implementing the client side of a SAML authorization. ruby-saml versions up to and including 1.12.4 contain an authentication bypass vulnerability due to an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, generating entirely different document structures from the same input. This allows an attacker to execute a Signature Wrapping attack. This issue is fixed in version 1.18.0.

PUBLISHED Reserved 2025-12-04 | Published 2025-12-09 | Updated 2025-12-09 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-347: Improper Verification of Cryptographic Signature

Product status

< 1.18.0
affected

References

github.com/...y-saml/security/advisories/GHSA-9v8j-x534-2fx3

github.com/...ommit/e9c1cdbd0f9afa467b585de279db0cbd0fb8ae97

github.com/advisories/GHSA-754f-8gm6-c4r2

cve.org (CVE-2025-66567)

nvd.nist.gov (CVE-2025-66567)

Download JSON