CVE-2025-34063
BaseFortify
Publication date: 2025-07-01
Last updated on: 2025-07-03
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a cryptographic authentication bypass in OneLogin AD Connector versions prior to 6.1.5. It occurs because the tenant's SSO JWT signing key is exposed via the /api/adc/v4/configuration endpoint. An attacker who obtains this signing key can create valid JWT tokens that impersonate any user within the OneLogin tenant, allowing unauthorized access to the OneLogin SSO portal and all connected applications using SAML or OIDC.
How can this vulnerability impact me? :
The vulnerability allows an attacker to gain full unauthorized access to the victim's SaaS environment by impersonating arbitrary users. This means the attacker can access sensitive data and applications that rely on OneLogin SSO authentication, potentially leading to data breaches, loss of confidentiality, integrity, and availability of services.