CVE-2025-66567
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-10

Assigner: GitHub, Inc.

Description
The ruby-saml library is for implementing the client side of a SAML authorization. ruby-saml versions up to and including 1.12.4 contain an authentication bypass vulnerability due to an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, generating entirely different document structures from the same input. This allows an attacker to execute a Signature Wrapping attack. This issue is fixed in version 1.18.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-10
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
ruby-saml ruby-saml 1.12.4
ruby-saml ruby-saml 1.18.0
onelogin ruby-saml to 1.18.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-347 The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the ruby-saml library versions up to 1.12.4 and is an authentication bypass caused by an incomplete fix for a previous vulnerability (CVE-2025-25292). The issue arises because the XML parsers ReXML and Nokogiri interpret the same XML input differently, resulting in different document structures. This discrepancy allows an attacker to perform a Signature Wrapping attack, bypassing authentication checks. The vulnerability is fixed in version 1.18.0 of ruby-saml.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to bypass authentication mechanisms in applications using vulnerable versions of ruby-saml. By exploiting the Signature Wrapping attack, an attacker could gain unauthorized access to systems or data that rely on ruby-saml for SAML authorization, potentially leading to data breaches or unauthorized actions within the affected system.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the ruby-saml library to version 1.18.0 or later, as this version contains the fix for the authentication bypass vulnerability caused by the incomplete fix in earlier versions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart