omniauth CVE Vulnerabilities & Metrics

Focus on omniauth vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About omniauth Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with omniauth. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total omniauth CVEs: 5
Earliest CVE date: 26 Jan 2018, 19:29 UTC
Latest CVE date: 10 Sep 2024, 19:15 UTC

Latest CVE reference: CVE-2024-45409

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical omniauth CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.86

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 2
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS omniauth CVEs

These are the five CVEs with the highest CVSS scores for omniauth, sorted by severity first and recency.

All CVEs for omniauth

CVE-2024-45409 omniauth vulnerability CVSS: 0 10 Sep 2024, 19:15 UTC

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.

CVE-2020-36599 omniauth vulnerability CVSS: 0 18 Aug 2022, 23:15 UTC

lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value.

CVE-2015-9284 omniauth vulnerability CVSS: 6.8 26 Apr 2019, 15:29 UTC

The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

CVE-2017-11430 omniauth vulnerability CVSS: 7.5 17 Apr 2019, 14:29 UTC

OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

CVE-2017-18076 omniauth vulnerability CVSS: 5.0 26 Jan 2018, 19:29 UTC

In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.