
CVE-2025-25292 – Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential)
https://notcve.org/view.php?id=CVE-2025-25292
12 Mar 2025 — ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. • https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released • CWE-347: Improper Verification of Cryptographic Signature CWE-436: Interpretation Conflict •

CVE-2025-25291 – ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential)
https://notcve.org/view.php?id=CVE-2025-25291
12 Mar 2025 — ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently; the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. • https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released • CWE-347: Improper Verification of Cryptographic Signature CWE-436: Interpretation Conflict •

CVE-2025-25293 – ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses
https://notcve.org/view.php?id=CVE-2025-25293
12 Mar 2025 — ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 an... • https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released • CWE-400: Uncontrolled Resource Consumption •

CVE-2024-45409 – The Ruby SAML library vulnerable to a SAML authentication bypass via Incorrect XPath selector
https://notcve.org/view.php?id=CVE-2024-45409
10 Sep 2024 — The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3. • https://packetstorm.news/files/id/182032 • CWE-347: Improper Verification of Cryptographic Signature •