Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-25291


ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.


Published

2025-03-12T21:15:42.000

Last Modified

2025-11-03T20:17:58.333

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-347
    CWE-436

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application omniauth omniauth_saml < 1.10.6 Yes
Application omniauth omniauth_saml < 2.1.3 Yes
Application omniauth omniauth_saml < 2.2.3 Yes
Application onelogin ruby-saml < 1.12.4 Yes
Application onelogin ruby-saml < 1.18.0 Yes
Application netapp storagegrid - Yes

References