CVE-2025-25293

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. Prior to versions 1.12.4 and 1.18.0, ruby-saml is susceptible to remote Denial of Service (DoS) with compressed SAML responses. ruby-saml uses zlib to decompress SAML responses in case they're compressed. It is possible to bypass the message size check with a compressed assertion since the message size is checked before inflation and not after. This issue may lead to remote Denial of Service (DoS). Versions 1.12.4 and 1.18.0 fix the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*
cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*
cpe:2.3:a:omniauth:omniauth_saml:*:*:*:*:*:ruby:*:*
cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*
cpe:2.3:a:onelogin:ruby-saml:*:*:*:*:*:*:*:*

History

03 Nov 2025, 20:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/04/msg00011.html -

Information

Published : 2025-03-12 21:15

Updated : 2025-11-03 20:17


NVD link : CVE-2025-25293

Mitre link : CVE-2025-25293

CVE.ORG link : CVE-2025-25293


JSON object : View

Products Affected

omniauth

  • omniauth_saml

onelogin

  • ruby-saml
CWE
CWE-400

Uncontrolled Resource Consumption