Home

Description

A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.

PUBLISHED Reserved 2025-04-15 | Published 2025-07-01 | Updated 2025-07-01 | Assigner VulnCheck




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-290 Authentication Bypass by Spoofing

Product status

Default status
unaffected

Any version before 6.1.5
affected

Credits

SpecterOps finder

References

support.onelogin.com/product-notification/noti-00001768 vendor-advisory patch

specterops.io/...nant-to-compromising-customer-signing-keys/ technical-description

vulncheck.com/...es/onelogin-ad-connector-account-compromise third-party-advisory

cve.org (CVE-2025-34063)

nvd.nist.gov (CVE-2025-34063)

Download JSON