First published: Mon Mar 03 2025(Updated: )
OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenID Connect | <=1.0 errata set 2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27370 is classified as a high severity vulnerability due to the potential for audience injection attacks.
To fix CVE-2025-27370, upgrade to a version of OpenID Connect Core that is beyond 1.0 errata set 2.
CVE-2025-27370 affects all implementations of OpenID Connect Core version 1.0 errata set 2.
The impact of CVE-2025-27370 includes the potential for attackers to manipulate authentication mechanisms to gain unauthorized access.
CVE-2025-27370 was disclosed in early 2025, detailing vulnerabilities related to the private_key_jwt authentication mechanism.