VYPR
Critical severityNVD Advisory· Published Mar 12, 2025· Updated Nov 3, 2025

Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential)

CVE-2025-25292

Description

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authentication bypass in ruby-saml due to XML parser differential between ReXML and Nokogiri, enabling signature wrapping attacks; patched in versions 1.12.4 and 1.18.0.

Vulnerability

Overview

CVE-2025-25292 is an authentication bypass vulnerability in the ruby-saml library, which implements SAML single sign-on (SSO) for Ruby. The root cause is a parser differential between ReXML and Nokogiri: these XML parsers can generate entirely different document structures from the same input. This discrepancy allows an attacker to craft a SAML response that is interpreted differently by the two parsers, thereby bypassing signature validation [1][3][4].

Exploitation

To exploit this vulnerability, an attacker must possess a single valid signature that was created with the key used to validate SAML responses or assertions of the targeted organization. With that signature, the attacker can construct a malicious SAML assertion that passes signature validation due to the parser differential, effectively executing a Signature Wrapping attack. No additional authentication is required beyond possession of the valid signature [3].

Impact

Successful exploitation leads to authentication bypass, allowing the attacker to log in as any user of the affected application (account takeover). The vulnerability affects ruby-saml versions prior to 1.12.4 and 1.18.0. Patches are available in versions 1.12.4 and 1.18.0 [1][3][4].

Mitigation

Users should upgrade to ruby-saml 1.12.4 or 1.18.0 immediately. Libraries that depend on ruby-saml, such as omniauth-saml, must also be updated to versions that reference a fixed ruby-saml version [1][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ruby-samlRubyGems
>= 1.13.0, < 1.18.01.18.0
ruby-samlRubyGems
< 1.12.41.12.4

Affected products

1
  • SAML-Toolkits/ruby-samlv5
    Range: < 1.12.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

16

News mentions

2