VYPR
High severityNVD Advisory· Published Mar 12, 2025· Updated Nov 3, 2025

ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses

CVE-2025-25293

Description

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ruby-saml prior to 1.12.4 and 1.18.0 is vulnerable to remote denial of service via compressed SAML responses that bypass message size checks.

Vulnerability

Overview

The vulnerability resides in how ruby-saml handles compressed SAML responses. The library uses zlib to decompress responses, but the message size check is performed on the compressed payload before inflation, not on the decompressed result. This allows an attacker to submit a small compressed assertion that expands to a much larger size, bypassing the intended size limit [1][3][4].

Exploitation

An attacker can exploit this by sending a crafted SAML response to a service provider using ruby-saml. No prior authentication is required, and the attack can be carried out remotely. The compressed assertion evades the size validation, leading to excessive memory allocation or CPU consumption during decompression [3].

Impact

Successful exploitation results in a denial of service (DoS) condition. The application may become unresponsive or crash, disrupting SAML-based single sign-on functionality for legitimate users [1][3].

Mitigation

The issue is fixed in ruby-saml versions 1.12.4 and 1.18.0. Users are advised to upgrade to one of these patched releases. No workaround is documented [1][3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ruby-samlRubyGems
< 1.12.41.12.4
ruby-samlRubyGems
>= 1.13.0, < 1.18.01.18.0

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

14

News mentions

0

No linked articles in our index yet.