CVE-2025-66567 PUBLISHED

ruby-saml has a SAML authentication bypass due to namespace handling (parser differential)

Assigner: GitHub_M
Reserved: 04.12.2025 Published: 09.12.2025 Updated: 09.12.2025

The ruby-saml library is for implementing the client side of a SAML authorization. ruby-saml versions up to and including 1.12.4 contain an authentication bypass vulnerability due to an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, generating entirely different document structures from the same input. This allows an attacker to execute a Signature Wrapping attack. This issue is fixed in version 1.18.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor SAML-Toolkits
Product ruby-saml
Versions
  • Version < 1.18.0 is affected

References

Problem Types

  • CWE-347: Improper Verification of Cryptographic Signature CWE