CVE-2025-66567: CWE-347: Improper Verification of Cryptographic Signature in SAML-Toolkits ruby-saml
The ruby-saml library is for implementing the client side of a SAML authorization. ruby-saml versions up to and including 1.12.4 contain an authentication bypass vulnerability due to an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, generating entirely different document structures from the same input. This allows an attacker to execute a Signature Wrapping attack. This issue is fixed in version 1.18.0.
AI Analysis
Technical Summary
CVE-2025-66567 affects the ruby-saml library, a widely used tool for implementing SAML client-side authentication in Ruby applications. The vulnerability arises from an improper verification of cryptographic signatures (CWE-347) due to inconsistent XML parsing between two XML parsers: ReXML and Nokogiri. These parsers generate different document object models from the same XML input, which attackers can exploit to perform a Signature Wrapping attack. This attack involves manipulating the XML structure to insert malicious assertions that bypass signature validation, effectively allowing an attacker to impersonate a legitimate user or service without possessing valid credentials. The issue stems from an incomplete fix for a previous vulnerability (CVE-2025-25292), meaning the underlying problem was not fully resolved in versions up to 1.12.4. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly dangerous. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or interaction required, and high impact on confidentiality and integrity. The vulnerability was published on December 9, 2025, and fixed in ruby-saml version 1.18.0. No public exploits have been reported yet, but the risk remains significant given the critical nature of SAML authentication in federated identity systems.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. SAML is widely used for single sign-on (SSO) and federated identity management across many sectors including government, finance, healthcare, and critical infrastructure. Exploitation could allow attackers to bypass authentication controls, gain unauthorized access to sensitive systems and data, and potentially move laterally within networks. This compromises confidentiality and integrity of user identities and access controls, potentially leading to data breaches, fraud, and disruption of services. Given the critical role of SAML in secure authentication, exploitation could undermine trust in identity providers and service providers. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if unpatched. European organizations with legacy ruby-saml versions are particularly vulnerable, especially those using Ruby-based web applications or services that rely on this library for SAML authentication.
Mitigation Recommendations
1. Immediately upgrade all ruby-saml dependencies to version 1.18.0 or later, which contains the fix for this vulnerability. 2. Conduct an inventory of all applications and services using ruby-saml to ensure no outdated versions remain in production or development environments. 3. Review and harden XML parsing configurations to enforce consistent and secure parsing behavior, potentially restricting or validating XML inputs more strictly. 4. Implement additional monitoring and anomaly detection for SAML authentication flows to detect unusual or unauthorized access attempts. 5. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XML Signature Wrapping attack patterns. 6. Educate development teams about secure XML handling and the risks of signature wrapping attacks to prevent similar issues in future code. 7. Perform penetration testing and code audits focusing on SAML authentication components to identify residual weaknesses. 8. Coordinate with identity providers and service providers to ensure end-to-end security of SAML assertions and tokens.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Finland
CVE-2025-66567: CWE-347: Improper Verification of Cryptographic Signature in SAML-Toolkits ruby-saml
Description
The ruby-saml library is for implementing the client side of a SAML authorization. ruby-saml versions up to and including 1.12.4 contain an authentication bypass vulnerability due to an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, generating entirely different document structures from the same input. This allows an attacker to execute a Signature Wrapping attack. This issue is fixed in version 1.18.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-66567 affects the ruby-saml library, a widely used tool for implementing SAML client-side authentication in Ruby applications. The vulnerability arises from an improper verification of cryptographic signatures (CWE-347) due to inconsistent XML parsing between two XML parsers: ReXML and Nokogiri. These parsers generate different document object models from the same XML input, which attackers can exploit to perform a Signature Wrapping attack. This attack involves manipulating the XML structure to insert malicious assertions that bypass signature validation, effectively allowing an attacker to impersonate a legitimate user or service without possessing valid credentials. The issue stems from an incomplete fix for a previous vulnerability (CVE-2025-25292), meaning the underlying problem was not fully resolved in versions up to 1.12.4. The vulnerability is remotely exploitable without any authentication or user interaction, making it highly dangerous. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or interaction required, and high impact on confidentiality and integrity. The vulnerability was published on December 9, 2025, and fixed in ruby-saml version 1.18.0. No public exploits have been reported yet, but the risk remains significant given the critical nature of SAML authentication in federated identity systems.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. SAML is widely used for single sign-on (SSO) and federated identity management across many sectors including government, finance, healthcare, and critical infrastructure. Exploitation could allow attackers to bypass authentication controls, gain unauthorized access to sensitive systems and data, and potentially move laterally within networks. This compromises confidentiality and integrity of user identities and access controls, potentially leading to data breaches, fraud, and disruption of services. Given the critical role of SAML in secure authentication, exploitation could undermine trust in identity providers and service providers. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if unpatched. European organizations with legacy ruby-saml versions are particularly vulnerable, especially those using Ruby-based web applications or services that rely on this library for SAML authentication.
Mitigation Recommendations
1. Immediately upgrade all ruby-saml dependencies to version 1.18.0 or later, which contains the fix for this vulnerability. 2. Conduct an inventory of all applications and services using ruby-saml to ensure no outdated versions remain in production or development environments. 3. Review and harden XML parsing configurations to enforce consistent and secure parsing behavior, potentially restricting or validating XML inputs more strictly. 4. Implement additional monitoring and anomaly detection for SAML authentication flows to detect unusual or unauthorized access attempts. 5. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XML Signature Wrapping attack patterns. 6. Educate development teams about secure XML handling and the risks of signature wrapping attacks to prevent similar issues in future code. 7. Perform penetration testing and code audits focusing on SAML authentication components to identify residual weaknesses. 8. Coordinate with identity providers and service providers to ensure end-to-end security of SAML assertions and tokens.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-04T16:17:35.386Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69378a8b0af42da4c56f97ca
Added to database: 12/9/2025, 2:33:47 AM
Last enriched: 12/16/2025, 6:04:54 AM
Last updated: 2/7/2026, 2:07:05 AM
Views: 416
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.