We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34063

OneLogin AD Connector JWT Authentication Bypass via Exposed Signing Key



Description

A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.

Reserved 2025-04-15 | Published 2025-07-01 | Updated 2025-07-01 | Assigner VulnCheck


CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-290 Authentication Bypass by Spoofing

Product status

Default status
unaffected

Any version before 6.1.5
affected

Credits

SpecterOps finder

References

support.onelogin.com/product-notification/noti-00001768 vendor-advisory patch

specterops.io/...nant-to-compromising-customer-signing-keys/ technical-description

vulncheck.com/...es/onelogin-ad-connector-account-compromise third-party-advisory

cve.org (CVE-2025-34063)

nvd.nist.gov (CVE-2025-34063)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34063

Support options

Helpdesk Chat, Email, Knowledgebase