HomeVulnerabilityOneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and...

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and techniques and Impersonate Apps

A high-severity security flaw has been disclosed within the One Id OneLogin Id and Entry Administration (IAM) resolution that, if efficiently exploited, might expose delicate OpenID Join (OIDC) utility consumer secrets and techniques beneath sure circumstances.

The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS rating of seven.7 out of 10.0. It has been described as a case of incorrect useful resource switch between spheres (CWE-669), which causes a program to cross security boundaries and acquire unauthorized entry to confidential knowledge or capabilities.

CVE-2025-59363 “allowed attackers with legitimate API credentials to enumerate and retrieve consumer secrets and techniques for all OIDC functions inside a company’s OneLogin tenant,” Clutch Safety mentioned in a report shared with The Hacker Information.

DFIR Retainer Services

The id security mentioned the issue stems from the truth that the appliance itemizing endpoint – /api/2/apps – was configured to return extra knowledge than anticipated, together with the client_secret values within the API response alongside metadata associated to the apps in a OneLogin account.

See also  CISA Flags Crucial ASUS Stay Replace Flaw After Proof of Lively Exploitation

The steps to drag off the assault are listed under –

  • Attacker makes use of legitimate OneLogin API credentials (consumer ID and secret) to authenticate
  • Request entry token
  • Name the /api/2/apps endpoint to checklist all functions
  • Parse the response to retrieve consumer secrets and techniques for all OIDC functions
  • Use extracted consumer secrets and techniques to impersonate functions and entry built-in companies

Profitable exploitation of the flaw might enable an attacker with legitimate OneLogin API credentials to retrieve consumer secrets and techniques for all OIDC functions configured inside a OneLogin tenant. Armed with this entry, the menace actor might leverage the uncovered secret to impersonate customers and acquire entry to different functions, providing alternatives for lateral motion.

OneLogin’s role-based entry management (RBAC) grants API keys broad endpoint entry, that means the compromised credentials could possibly be used to entry delicate endpoints throughout your complete platform. Compounding issues additional is the shortage of IP handle allowlisting, because of which it is doable for attackers to take advantage of the flaw from wherever on the planet, Clutch famous.

CIS Build Kits

Following accountable disclosure on July 18, 2025, the vulnerability was addressed in OneLogin 2025.3.0, which was launched final month by making OIDC client_secret values now not seen. There isn’t any proof that the difficulty was ever exploited within the wild.

See also  Apple Patches Safari Vulnerability Additionally Exploited as Zero-Day in Google Chrome

“Id suppliers function the spine of enterprise security structure,” Clutch Safety mentioned. “Vulnerabilities in these methods can have cascading results throughout whole know-how stacks, making rigorous API security important.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular