VYPR
Critical severityNVD Advisory· Published May 27, 2023· Updated Jan 14, 2025

CVE-2015-20108

CVE-2015-20108

Description

xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby allows XPath injection and code execution because prepared statements are not used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Ruby-saml gem before 1.0.0 has an XPath injection in xml_security.rb allowing code execution.

The ruby-saml gem versions prior to 1.0.0 contain an XPath injection vulnerability in the xml_security.rb file. The root cause is the failure to use prepared statements when handling XPath queries, allowing an attacker to inject malicious XPath expressions [2][3].

Exploitation does not require authentication if an attacker can supply a crafted SAML response. By injecting special characters into the XML, the attacker can manipulate XPath queries executed by the library, potentially achieving remote code execution [3].

Successful exploitation could grant an attacker full control over the application, leading to data theft, service disruption, or further compromise [3].

The vulnerability is fixed in ruby-saml version 1.0.0. Users are advised to upgrade immediately [2][4]. No workarounds are available.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ruby-samlRubyGems
< 1.0.01.0.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.