We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34062

OneLogin AD Connector API Credential and Signing Key Exposure



Description

An information disclosure vulnerability exists in OneLogin AD Connector versions prior to 6.1.5 via the /api/adc/v4/configuration endpoint. An attacker with access to a valid directory_token—which may be retrievable from host registry keys or improperly secured logs—can retrieve a plaintext response disclosing sensitive credentials. These may include an API key, AWS IAM access and secret keys, and a base64-encoded JWT signing key used in the tenant’s SSO IdP configuration.

Reserved 2025-04-15 | Published 2025-07-01 | Updated 2025-07-01 | Assigner VulnCheck


MEDIUM: 5.7CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

CWE-522 Insufficiently Protected Credentials

Product status

Default status
unaffected

Any version before 6.1.5
affected

Credits

SpecterOps finder

References

support.onelogin.com/product-notification/noti-00001768 vendor-advisory patch

specterops.io/...nant-to-compromising-customer-signing-keys/ technical-description

vulncheck.com/...es/onelogin-ad-connector-account-compromise third-party-advisory

cve.org (CVE-2025-34062)

nvd.nist.gov (CVE-2025-34062)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34062

Support options

Helpdesk Chat, Email, Knowledgebase