Vulnerability Description
The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because the SAML response is validated for Base64 format prior to checking the message size, leading to potential resource exhaustion. This is fixed in version 1.18.1.
Related Weaknesses (CWE)
References
- https://github.com/SAML-Toolkits/ruby-saml/commit/38ef5dd1ce17514e202431f569c4f5
- https://github.com/SAML-Toolkits/ruby-saml/pull/770
- https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.18.1
- https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-rrqh-93c8-j9
- https://lists.debian.org/debian-lts-announce/2025/09/msg00001.html
FAQ
What is CVE-2025-54572?
CVE-2025-54572 is a documented vulnerability. The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesiz...
How severe is CVE-2025-54572?
CVSS scoring is not yet available for CVE-2025-54572. Check NVD for updates.
Is there a patch for CVE-2025-54572?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.