← Back to CVEs
CVE-2025-25291
CRITICAL9.8
Description
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/12/2025
Last Modified11/3/2025
Sourcenvd
Honeypot Sightings0
Affected Products
netapp:storagegridomniauth:omniauth_samlonelogin:ruby-saml
Weaknesses (CWE)
CWE-347CWE-436
References
https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released(security-advisories@github.com)
https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials(security-advisories@github.com)
https://github.com/SAML-Toolkits/ruby-saml/commit/e76c5b36bac40aedbf1ba7ffaaf495be63328cd9(security-advisories@github.com)
https://github.com/SAML-Toolkits/ruby-saml/commit/e9c1cdbd0f9afa467b585de279db0cbd0fb8ae97(security-advisories@github.com)
https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.12.4(security-advisories@github.com)
https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.0(security-advisories@github.com)
https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-4vc4-m8qh-g8jm(security-advisories@github.com)
https://github.com/omniauth/omniauth-saml/security/advisories/GHSA-hw46-3hmr-x9xv(security-advisories@github.com)
https://portswigger.net/research/saml-roulette-the-hacker-always-wins(security-advisories@github.com)
https://securitylab.github.com/advisories/GHSL-2024-329_GHSL-2024-330_ruby-saml(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2025/04/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
https://news.ycombinator.com/item?id=43374519(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20250314-0010/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.