CVE-2025-57821
Ruby vulnerability analysis and mitigation

Overview

CVE-2025-57821 affects Basecamp's Google Sign-In Rails application integration prior to version 1.3.0. The vulnerability was discovered and disclosed on August 27, 2025, impacting applications using this authentication component. The issue allows attackers to craft malformed URLs that bypass the 'same origin' security check, potentially leading to unauthorized redirects (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-601 (URL Redirection to Untrusted Site) with a CVSS v3.1 score of 4.2 (Medium). The attack vector is Network-based (AV:N) with High attack complexity (AC:H), requiring no privileges (PR:N) but user interaction (UI:R), with unchanged scope (S:U) and low impact on confidentiality (C:L) and integrity (I:L) with no availability impact (A:N) (GitHub Advisory).

Impact

The vulnerability primarily affects Rails applications configured to store flash information in session cookies. If successfully exploited, it could lead to users being redirected to malicious sites after authentication, potentially exposing authentication information such as tokens. The impact is particularly significant when combined with attacks that allow injection of arbitrary data into session cookies (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.3.0 of the googlesignin gem. For users unable to upgrade immediately, a workaround is available by explicitly setting SameSite=Lax or SameSite=Strict on the application session cookie. This helps mitigate the potential for chained attacks (GitHub Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-24293CRITICAL9.2
  • RubyRuby
  • activestorage
NoYesAug 14, 2025
CVE-2025-54887CRITICAL9.1
  • RubyRuby
  • jwe
NoYesAug 08, 2025
CVE-2025-58067MEDIUM4.2
  • RubyRuby
  • google_sign_in
NoYesAug 29, 2025
CVE-2025-57821MEDIUM4.2
  • RubyRuby
  • google_sign_in
NoYesAug 27, 2025
CVE-2025-55193LOW2.7
  • RubyRuby
  • cpe:2.3:a:rubyonrails:rails
NoYesAug 13, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management