We found results for “”
CVE-2025-66567
Good to know:
Date: December 9, 2025
The ruby-saml library is for implementing the client side of a SAML authorization. ruby-saml versions up to and including 1.12.4 contain an authentication bypass vulnerability due to an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, generating entirely different document structures from the same input. This allows an attacker to execute a Signature Wrapping attack. This issue is fixed in version 1.18.0.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Verification of Cryptographic Signature
CWE-347Top Fix
Upgrade Version
Upgrade to version ruby-saml - 1.18.0;https://github.com/SAML-Toolkits/ruby-saml.git - v1.18.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


