Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4115-1 | ruby-saml security update |
EUVD |
EUVD-2025-6414 | ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue. |
Github GHSA |
GHSA-754f-8gm6-c4r2 | Ruby SAML allows a SAML authentication bypass due to namespace handling (parser differential) |
Ubuntu USN |
USN-7409-1 | RubySAML vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 13 Sep 2025 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 02 Aug 2025 03:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netapp
Netapp storagegrid |
|
| CPEs | cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Netapp
Netapp storagegrid |
Sat, 02 Aug 2025 00:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Omniauth
Omniauth omniauth Saml Onelogin Onelogin ruby-saml |
|
| CPEs | cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:* cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Omniauth
Omniauth omniauth Saml Onelogin Onelogin ruby-saml |
|
| Metrics |
cvssV3_1
|
Sat, 12 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 20 Mar 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 19 Mar 2025 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 16 Mar 2025 06:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 14 Mar 2025 19:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Mar 2025 06:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 13 Mar 2025 06:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue. | |
| Title | Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential) | |
| Weaknesses | CWE-347 CWE-436 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T19:45:01.139Z
Reserved: 2025-02-06T17:13:33.122Z
Link: CVE-2025-25292
Updated: 2025-03-15T20:47:21.997Z
Status : Modified
Published: 2025-03-12T21:15:42.177
Modified: 2025-11-03T20:17:58.943
Link: CVE-2025-25292
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN