In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade nokogiri to version 1.19.1 or higher.
nokogiri is a gem for parsing HTML, XML, SAX, and Reader.
Affected versions of this package are vulnerable to Unchecked Return Value from xmlC14NExecute, used in the canonicalize methods. These return and empty string rather than an error code for invalid and incomplete XML inputs. Although this behavior is not in itself a vulnerability in the parsing functionality, it has been demonstrated to be exploitable as a signature bypass in the vulnerability described in CVE-2025-66568.
Note: This is only exploitable in the CRuby extension. JRuby is not vulnerable.