The ruby-saml library implements the client side of an SAML authorization. Versions up to and including 1.12.4, are vulnerable to authentication bypass through the libxml2 canonicalization process used by Nokogiri for document transformation, which allows an attacker to execute a Signature Wrapping attack. When libxml2’s canonicalization is invoked on an invalid XML input, it may return an empty string rather than a canonicalized node. ruby-saml then proceeds to compute the DigestValue over this empty string, treating it as if canonicalization succeeded. This issue is fixed in version 1.18.0.
History

Wed, 10 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Onelogin
Onelogin ruby-saml
CPEs cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*
Vendors & Products Onelogin
Onelogin ruby-saml
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Tue, 09 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Saml-toolkits
Saml-toolkits ruby-saml
Vendors & Products Saml-toolkits
Saml-toolkits ruby-saml

Tue, 09 Dec 2025 02:30:00 +0000

Type Values Removed Values Added
Description The ruby-saml library implements the client side of an SAML authorization. Versions up to and including 1.12.4, are vulnerable to authentication bypass through the libxml2 canonicalization process used by Nokogiri for document transformation, which allows an attacker to execute a Signature Wrapping attack. When libxml2’s canonicalization is invoked on an invalid XML input, it may return an empty string rather than a canonicalized node. ruby-saml then proceeds to compute the DigestValue over this empty string, treating it as if canonicalization succeeded. This issue is fixed in version 1.18.0.
Title ruby-saml Libxml2 Canonicalization errors can bypass Digest/Signature validation
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-09T16:02:52.564Z

Reserved: 2025-12-04T16:17:35.386Z

Link: CVE-2025-66568

cve-icon Vulnrichment

Updated: 2025-12-09T14:16:27.389Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T16:18:21.427

Modified: 2025-12-10T21:25:45.097

Link: CVE-2025-66568

cve-icon Redhat

No data.