Vulnerability Management, Threat Intelligence, Patch/Configuration Management

Account hijacking possible with ruby-saml library bugs

Adobe Stock

Open-source library ruby-saml has been impacted by a pair of high-severity flaws, tracked as CVE-2025-25291 and CVE-2025-25292, which could be exploited to circumvent the authentication defenses of the Security Assertion Markup Language and facilitate account takeovers, The Hacker News reports.

Both vulnerabilities — which have already been addressed in new ruby-saml versions — originate from the differences in XML parsing between REXML and Nokogiri, as well as hash and signature verifications, according to findings from the GitHub Security Lab.

"Attackers who are in possession of a single valid signature that was created with the key used to validate SAML responses or assertions of the targeted organization can use it to construct SAML assertions themselves and are in turn able to log in as any user," said researcher Peter Stöckli.

Updates have also been released by GitLab to fix the security issues in Community Edition and Enterprise Edition instances.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds