CVE Vulnerabilities

CVE-2025-25291

Improper Verification of Cryptographic Signature

Published: Mar 12, 2025 | Modified: Nov 03, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

NameVendorStart VersionEnd Version
Omniauth_samlOmniauth*1.10.6 (excluding)
Omniauth_samlOmniauth2.0.0 (including)2.1.3 (excluding)
Omniauth_samlOmniauth2.2.0 (including)2.2.3 (excluding)
Ruby-samlOnelogin*1.12.4 (excluding)
Ruby-samlOnelogin1.13.0 (including)1.18.0 (excluding)
Ruby-samlUbuntuesm-apps/bionic*
Ruby-samlUbuntuesm-apps/focal*
Ruby-samlUbuntuesm-apps/jammy*
Ruby-samlUbuntuesm-apps/noble*
Ruby-samlUbuntuesm-apps/xenial*
Ruby-samlUbuntufocal*
Ruby-samlUbuntujammy*
Ruby-samlUbuntunoble*
Ruby-samlUbuntuoracular*
Ruby-samlUbuntuplucky*
Ruby-samlUbuntuupstream*

References