Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66567: CWE-347: Improper Verification of Cryptographic Signature in SAML-Toolkits ruby-saml

0
Critical
VulnerabilityCVE-2025-66567cvecve-2025-66567cwe-347
Published: Tue Dec 09 2025 (12/09/2025, 01:55:06 UTC)
Source: CVE Database V5
Vendor/Project: SAML-Toolkits
Product: ruby-saml

Description

The ruby-saml library is for implementing the client side of a SAML authorization. ruby-saml versions up to and including 1.12.4 contain an authentication bypass vulnerability due to an incomplete fix for CVE-2025-25292. ReXML and Nokogiri parse XML differently, generating entirely different document structures from the same input. This allows an attacker to execute a Signature Wrapping attack. This issue is fixed in version 1.18.0.

AI-Powered Analysis

AILast updated: 12/09/2025, 02:48:57 UTC

Technical Analysis

CVE-2025-66567 is a critical vulnerability in the ruby-saml library, which is widely used to implement client-side SAML authorization in Ruby applications. The vulnerability stems from an incomplete fix for a previous CVE (2025-25292) and involves improper verification of cryptographic signatures (CWE-347). The root cause is the differing XML parsing behaviors of ReXML and Nokogiri libraries, which parse the same XML input into different document structures. This discrepancy enables attackers to craft malicious SAML responses that exploit Signature Wrapping attacks, allowing them to bypass authentication controls without needing any privileges or user interaction. The vulnerability has a CVSS 4.0 base score of 9.3, indicating critical severity with network attack vector, low attack complexity, and no required authentication. The impact includes unauthorized access to protected resources, compromising confidentiality and integrity of authentication tokens. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to any system using vulnerable ruby-saml versions (prior to 1.18.0). The issue is resolved in ruby-saml 1.18.0 by correcting the signature verification logic and ensuring consistent XML parsing. Organizations using ruby-saml for SAML-based single sign-on should prioritize upgrading to the fixed version and auditing their SAML implementations for similar weaknesses.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized access to critical systems and sensitive data by bypassing authentication mechanisms in SAML-based single sign-on solutions. SAML is widely used across European enterprises, government agencies, and financial institutions to enable federated identity management. Exploitation could result in data breaches, identity theft, and disruption of services, undermining trust and compliance with regulations such as GDPR. The criticality is heightened in sectors with stringent security requirements, including banking, healthcare, and public administration. Attackers exploiting this flaw could impersonate legitimate users, escalate privileges, and move laterally within networks. The lack of required authentication or user interaction makes this vulnerability particularly dangerous, as it can be exploited remotely over the network. Although no active exploits are reported, the high CVSS score and the nature of the vulnerability demand immediate attention to prevent potential attacks.

Mitigation Recommendations

1. Upgrade ruby-saml to version 1.18.0 or later immediately to apply the official fix addressing the signature verification flaw. 2. Conduct a thorough audit of all SAML implementations to ensure consistent XML parsing libraries are used and that signature verification logic is robust against Signature Wrapping attacks. 3. Implement additional XML signature validation controls, such as strict schema validation and namespace enforcement, to prevent manipulation of XML structures. 4. Monitor authentication logs for unusual SAML assertion patterns or unexpected authentication successes. 5. Employ network-level protections like Web Application Firewalls (WAFs) configured to detect and block malformed SAML responses. 6. Educate development and security teams about the risks of XML parsing inconsistencies and the importance of using secure libraries. 7. Consider deploying runtime application self-protection (RASP) tools to detect anomalous authentication flows. 8. Review and update incident response plans to include scenarios involving SAML authentication bypasses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-04T16:17:35.386Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69378a8b0af42da4c56f97ca

Added to database: 12/9/2025, 2:33:47 AM

Last enriched: 12/9/2025, 2:48:57 AM

Last updated: 12/10/2025, 11:50:54 PM

Views: 222

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats