Ruby-saml has a SAML authentication bypass due to namespace handling (parser differential)
Critical severity
GitHub Reviewed
Published
Dec 8, 2025
in
SAML-Toolkits/ruby-saml
•
Updated Dec 9, 2025
Description
Published to the GitHub Advisory Database
Dec 8, 2025
Reviewed
Dec 8, 2025
Published by the National Vulnerability Database
Dec 9, 2025
Last updated
Dec 9, 2025
Summary
Ruby-saml up to and including 1.12.4, there is an authentication bypass vulnerability because of an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. The vulnerability does not affect the version 1.18.0.
Impact
That allows an attacker to be able to execute a Signature Wrapping attack and bypass the authentication
References