Published Correcting updates of the platform for organizing joint development Gitlab – 17.9.2, 17.8.5, and 17.7.7, in which it is eliminated vulnerability (cve-2025-25291, cve-2025-25292), which allows you to get around authentication on the basis of saml (Security Assertion Markup Language). The vulnerability is present in the Ruby Bibliotex ruby-saml, which realizes the functions for SAML automation. In addition to Gitlab, vulnerability affects other projects using this library. The problem is eliminated in updates ruby-saml 1.18.0 and 1.12.4.
Vulnerability caused by differences in The analysis of the XML-documents by Parsers REXML and Nokogiri, as a result of which, when processing the same XML document, documents were generated, different in their structure. The problem is that REXML and Nokogiri are differently processed in the XML document digital signatures, which can be used to create the conditions under which one signature will be used during verification, and when certification of the user is different. This possibility allows the attacker to use the attack method xsw (XML SIGNATURE Wrapping) for falsification of SAML response for arbitrary contents, having access to any signed SAML document.
The problem was identified as a result of the initiative of GitHub, which considered the possibility of translating GitHub to use this library and for the purpose of