The ruby-saml library implements the client side of an SAML authorization. Versions up to and including 1.12.4, are vulnerable to authentication bypass through the libxml2 canonicalization process used by Nokogiri for document transformation, which allows an attacker to execute a Signature Wrapping attack. When libxml2’s canonicalization is invoked on an invalid XML input, it may return an empty string rather than a canonicalized node. ruby-saml then proceeds to compute the DigestValue over this empty string, treating it as if canonicalization succeeded. This issue is fixed in version 1.18.0.
References
| Link | Resource |
|---|---|
| https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a | Broken Link |
| https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-x4h9-gwv3-r4m4 | Vendor Advisory |
Configurations
History
10 Dec 2025, 21:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/SAML-Toolkits/ruby-saml/commit/acac9e9cc0b9a507882c614f25d41f8b47be349a - Broken Link | |
| References | () https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-x4h9-gwv3-r4m4 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| First Time |
Onelogin
Onelogin ruby-saml |
|
| CPE | cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:* |
09 Dec 2025, 16:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 16:18
Updated : 2025-12-10 21:25
NVD link : CVE-2025-66568
Mitre link : CVE-2025-66568
CVE.ORG link : CVE-2025-66568
JSON object : View
Products Affected
onelogin
- ruby-saml
CWE
CWE-347
Improper Verification of Cryptographic Signature
