Cyber Posture

CVE-2025-25292

CriticalPublic PoC

Published: 12 March 2025

Published
12 March 2025
Modified
03 November 2025
KEV Added
Patch
12 March 2025
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0408 88.6th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.

Security Summary

CVE-2025-25292 is an authentication bypass vulnerability in the ruby-saml library, which provides Security Assertion Markup Language (SAML) single sign-on (SSO) functionality for Ruby applications. The flaw affects versions prior to 1.12.4 and 1.18.0 and arises from a parser differential between the ReXML and Nokogiri XML parsers. These parsers can generate entirely different document structures from the same XML input, enabling a Signature Wrapping attack that undermines SAML authentication. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-347 (Improper Verification of Cryptographic Signature) and CWE-436 (Interpretation Conflict).

Attackers require no privileges and can exploit the issue remotely over the network with low complexity and no user interaction. By submitting a specially crafted SAML response that leverages the parser discrepancy, an attacker can bypass authentication, potentially impersonating any user in ruby-saml-dependent applications, such as those using SAML SSO for access control.

Mitigation involves upgrading to ruby-saml versions 1.12.4 or 1.18.0, which contain patches addressing the parser differential, as documented in the library's commit history and release notes. GitLab released version 17.9.2 to patch the issue, and a GitHub security blog post details the parser differentials enabling SAML SSO bypass.

Details

CWE(s)
CWE-347CWE-436

Affected Products

omniauth
omniauth saml
≤ 1.10.6 · 2.0.0 — 2.1.3 · 2.2.0 — 2.2.3
onelogin
ruby-saml
≤ 1.12.4 · 1.13.0 — 1.18.0
netapp
storagegrid
all versions

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1606.002 SAML Tokens Credential Access
An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.
Why these techniques?

The ruby-saml vulnerability enables authentication bypass via Signature Wrapping attacks exploiting XML parser differentials (ReXML vs. Nokogiri), allowing attackers to forge SAML tokens (T1606.002) and exploit public-facing SAML SSO applications (T1190).

References