Ruby-saml has a SAML authentication bypass due to namespace handling (parser differential)
Critical severity
GitHub Reviewed
Published
Dec 8, 2025
in
SAML-Toolkits/ruby-saml
•
Updated Dec 8, 2025
Description
Published to the GitHub Advisory Database
Dec 8, 2025
Reviewed
Dec 8, 2025
Last updated
Dec 8, 2025
Summary
Ruby-saml up to and including 1.12.4, there is an authentication bypass vulnerability because of an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. The vulnerability does not affect the version 1.18.0.
Impact
That allows an attacker to be able to execute a Signature Wrapping attack and bypass the authentication
References