Cyber Posture

CVE-2025-25291

CriticalPublic PoC

Published: 12 March 2025

Published
12 March 2025
Modified
03 November 2025
KEV Added
Patch
12 March 2025
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2084 95.6th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.

Security Summary

CVE-2025-25291 is an authentication bypass vulnerability in the ruby-saml library, which provides Security Assertion Markup Language (SAML) single sign-on (SSO) functionality for Ruby applications. The issue affects versions prior to 1.12.4 and 1.18.0 and stems from a parser differential between ReXML and Nokogiri XML parsers. These parsers can produce different document structures from the same XML input, enabling a Signature Wrapping attack. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-347 (Improper Verification of Cryptographic Signature) and CWE-436 (Interpretation Conflict).

A remote, unauthenticated attacker can exploit this vulnerability by crafting malicious SAML XML payloads that exploit the parsing discrepancy. This allows the attacker to bypass authentication checks, potentially signing in as any user without valid credentials. The attack requires no user interaction or privileges, making it highly practical over the network.

Advisories and patches recommend upgrading to ruby-saml versions 1.12.4 or 1.18.0, where the issue is fixed via specific commits addressing the parser handling. GitLab released version 17.9.2 on March 12, 2025, to patch affected instances, and a GitHub security blog post details the parser differential technique used in the Signature Wrapping attack.

Details

CWE(s)
CWE-347CWE-436

Affected Products

omniauth
omniauth saml
≤ 1.10.6 · 2.0.0 — 2.1.3 · 2.2.0 — 2.2.3
onelogin
ruby-saml
≤ 1.12.4 · 1.13.0 — 1.18.0
netapp
storagegrid
all versions

MITRE ATT&CK Enterprise Techniques

T1606.002 SAML Tokens Credential Access
An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.
Why these techniques?

The vulnerability in ruby-saml enables signature wrapping attacks exploiting parser differentials between ReXML and Nokogiri, allowing adversaries to forge SAML tokens for authentication bypass and impersonation.

References