
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-25291 is a critical authentication bypass vulnerability discovered in ruby-saml prior to versions 1.12.4 and 1.18.0. The vulnerability exists due to a parser differential where ReXML and Nokogiri parse XML differently, causing the parsers to generate entirely different document structures from the same XML input (GitHub Blog, NVD). The vulnerability was discovered in March 2025 and affects applications using the ruby-saml library for SAML SSO authentication.
The vulnerability stems from the use of two different XML parsers (REXML and Nokogiri) during signature verification in ruby-saml. The parser differential allows attackers to execute a Signature Wrapping attack by manipulating XML documents. When validating SAML responses, REXML is used to parse the document and validate signatures, while Nokogiri is used to access attributes. This inconsistency in parsing can lead to different document structures being generated from the same XML input, allowing attackers to bypass signature verification (PortSwigger, GitHub Blog).
The vulnerability allows attackers who possess a single valid signed SAML document from the IdP to authenticate as any valid user within the environment's SAML IdP. This can lead to complete authentication bypass and account takeover attacks (Hacker News, GitLab Release).
The vulnerability has been fixed in ruby-saml versions 1.12.4 and 1.18.0. For users who cannot immediately update, temporary mitigations include enabling GitLab two-factor authentication for all user accounts, disabling the SAML two-factor bypass option, and requiring admin approval for automatically created new users. It's important to note that enabling identity provider multi-factor authentication does not mitigate this vulnerability (GitLab Release, NetApp Advisory).
The vulnerability has garnered significant attention in the security community. GitLab immediately released patches for affected versions, and other major organizations like NetApp issued security advisories. Security researchers have emphasized the serious nature of the vulnerability, with some experts recommending transitioning away from SAML to OAuth due to the inherent security risks in XML-DSIG implementations (Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”