Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4115-1 | ruby-saml security update |
EUVD |
EUVD-2025-6414 | ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue. |
Github GHSA |
GHSA-754f-8gm6-c4r2 | Ruby SAML allows a SAML authentication bypass due to namespace handling (parser differential) |
Ubuntu USN |
USN-7409-1 | RubySAML vulnerabilities |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 12 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 01 Aug 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netapp
Netapp storagegrid |
|
| CPEs | cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Netapp
Netapp storagegrid |
Fri, 01 Aug 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Omniauth
Omniauth omniauth Saml Onelogin Onelogin ruby-saml |
|
| CPEs | cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:* cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Omniauth
Omniauth omniauth Saml Onelogin Onelogin ruby-saml |
|
| Metrics |
cvssV3_1
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 20 Mar 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 18 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 15 Mar 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 14 Mar 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 12 Mar 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 12 Mar 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue. | |
| Title | Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential) | |
| Weaknesses | CWE-347 CWE-436 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T19:45:01.139Z
Reserved: 2025-02-06T17:13:33.122Z
Link: CVE-2025-25292
Updated: 2025-03-15T20:47:21.997Z
Status : Modified
Published: 2025-03-12T21:15:42.177
Modified: 2025-11-03T20:17:58.943
Link: CVE-2025-25292
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN