Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-25291— ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential)

EPSS 20.84% · P96
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-25291

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential)
Source: NVD (National Vulnerability Database)
Vulnerability Description
ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
密码学签名的验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
OneLogin ruby-saml 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Onelogin OneLogin ruby-saml是美国Onelogin公司的一款基于Ruby的、用于单点登录(SSO)服务的SAML(安全断言标记语言)库。 ruby-saml 1.12.4和1.18.0之前版本存在安全漏洞,该漏洞源于解析器差异,可能导致认证绕过。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SAML-Toolkitsruby-saml < 1.12.4 -

II. Public POCs for CVE-2025-25291

#POC DescriptionSource LinkShenlong Link
1ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 fix the issue. https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2025/CVE-2025-25291.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-25291

登录查看更多情报信息。

Same Patch Batch · SAML-Toolkits · 2025-03-12 · 3 CVEs total

CVE-2025-25293ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses
CVE-2025-25292Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser diffe

IV. Related Vulnerabilities

V. Comments for CVE-2025-25291

No comments yet


Leave a comment