CVE-2025-27370: CWE-305 Authentication Bypass by Primary Weakness in OpenID OpenID Connect
OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client.
AI Analysis
Technical Summary
CVE-2025-27370 is a medium-severity vulnerability affecting OpenID Connect Core through version 1.0 errata set 2. The issue arises from an authentication bypass caused by a primary weakness in the private_key_jwt authentication mechanism. Specifically, a malicious Authorization Server can exploit audience injection vulnerabilities to manipulate the 'audience' claim within JWT tokens. This manipulation allows the attacker to insert attacker-controlled values such as token endpoints or issuer identifiers of other legitimate Authorization Servers. Consequently, the malicious Authorization Server can leverage these crafted private key JWTs to impersonate the Client, effectively bypassing authentication controls. This vulnerability stems from CWE-305, which relates to authentication bypass by primary weakness, indicating that the core authentication logic can be subverted under certain conditions. The flaw does not require user interaction but does require the presence of a malicious or compromised Authorization Server within the OpenID Connect ecosystem. No known exploits are currently reported in the wild, and no patches have been officially released as of the publication date. The vulnerability impacts implementations of OpenID Connect that rely on the private_key_jwt client authentication method and do not adequately validate the audience claim, thus allowing cross-issuer token misuse and client impersonation.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying heavily on OpenID Connect for federated identity and single sign-on (SSO) solutions. Successful exploitation could lead to unauthorized access to sensitive systems by allowing attackers to impersonate legitimate clients, potentially bypassing multi-factor authentication and other security controls. This can result in data breaches, unauthorized transactions, and lateral movement within corporate networks. Critical sectors such as finance, healthcare, government, and telecommunications, which often use OpenID Connect for identity federation, are particularly at risk. The compromise of client identities could undermine trust in identity providers and disrupt secure access to cloud services and internal applications. Additionally, the ability to impersonate clients may facilitate further attacks, including privilege escalation and data exfiltration. Given the interconnected nature of European digital infrastructure and the reliance on identity federation for compliance with regulations like eIDAS and GDPR, the impact could extend beyond individual organizations to affect broader supply chains and citizen services.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and audit their OpenID Connect implementations, focusing on the private_key_jwt authentication method. 2) Ensure strict validation of the 'audience' claim in JWT tokens, verifying that it matches the expected token endpoint or issuer identifier for the specific Authorization Server. 3) Limit trust relationships to only well-vetted and trusted Authorization Servers, avoiding acceptance of tokens from unknown or untrusted issuers. 4) Implement additional monitoring and anomaly detection for unusual authentication patterns that could indicate client impersonation attempts. 5) Where possible, transition to alternative client authentication methods less susceptible to audience injection, such as mutual TLS or client secrets, until patches or updates addressing this vulnerability are available. 6) Engage with OpenID Connect vendors and open-source communities to track patch releases and apply updates promptly once available. 7) Conduct penetration testing and threat modeling exercises to assess exposure and validate the effectiveness of mitigations. 8) Educate security teams and developers about the risks of audience injection and the importance of strict token validation in federated identity systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Finland, Denmark
CVE-2025-27370: CWE-305 Authentication Bypass by Primary Weakness in OpenID OpenID Connect
Description
OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client.
AI-Powered Analysis
Technical Analysis
CVE-2025-27370 is a medium-severity vulnerability affecting OpenID Connect Core through version 1.0 errata set 2. The issue arises from an authentication bypass caused by a primary weakness in the private_key_jwt authentication mechanism. Specifically, a malicious Authorization Server can exploit audience injection vulnerabilities to manipulate the 'audience' claim within JWT tokens. This manipulation allows the attacker to insert attacker-controlled values such as token endpoints or issuer identifiers of other legitimate Authorization Servers. Consequently, the malicious Authorization Server can leverage these crafted private key JWTs to impersonate the Client, effectively bypassing authentication controls. This vulnerability stems from CWE-305, which relates to authentication bypass by primary weakness, indicating that the core authentication logic can be subverted under certain conditions. The flaw does not require user interaction but does require the presence of a malicious or compromised Authorization Server within the OpenID Connect ecosystem. No known exploits are currently reported in the wild, and no patches have been officially released as of the publication date. The vulnerability impacts implementations of OpenID Connect that rely on the private_key_jwt client authentication method and do not adequately validate the audience claim, thus allowing cross-issuer token misuse and client impersonation.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying heavily on OpenID Connect for federated identity and single sign-on (SSO) solutions. Successful exploitation could lead to unauthorized access to sensitive systems by allowing attackers to impersonate legitimate clients, potentially bypassing multi-factor authentication and other security controls. This can result in data breaches, unauthorized transactions, and lateral movement within corporate networks. Critical sectors such as finance, healthcare, government, and telecommunications, which often use OpenID Connect for identity federation, are particularly at risk. The compromise of client identities could undermine trust in identity providers and disrupt secure access to cloud services and internal applications. Additionally, the ability to impersonate clients may facilitate further attacks, including privilege escalation and data exfiltration. Given the interconnected nature of European digital infrastructure and the reliance on identity federation for compliance with regulations like eIDAS and GDPR, the impact could extend beyond individual organizations to affect broader supply chains and citizen services.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and audit their OpenID Connect implementations, focusing on the private_key_jwt authentication method. 2) Ensure strict validation of the 'audience' claim in JWT tokens, verifying that it matches the expected token endpoint or issuer identifier for the specific Authorization Server. 3) Limit trust relationships to only well-vetted and trusted Authorization Servers, avoiding acceptance of tokens from unknown or untrusted issuers. 4) Implement additional monitoring and anomaly detection for unusual authentication patterns that could indicate client impersonation attempts. 5) Where possible, transition to alternative client authentication methods less susceptible to audience injection, such as mutual TLS or client secrets, until patches or updates addressing this vulnerability are available. 6) Engage with OpenID Connect vendors and open-source communities to track patch releases and apply updates promptly once available. 7) Conduct penetration testing and threat modeling exercises to assess exposure and validate the effectiveness of mitigations. 8) Educate security teams and developers about the risks of audience injection and the importance of strict token validation in federated identity systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-02-23T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d983fc4522896dcbf04a0
Added to database: 5/21/2025, 9:09:19 AM
Last enriched: 6/24/2025, 12:26:10 PM
Last updated: 11/22/2025, 8:36:17 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumCVE-2025-12752: CWE-345 Insufficient Verification of Data Authenticity in scottpaterson Subscriptions & Memberships for PayPal
MediumCVE-2025-11186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in humanityco Cookie Notice & Compliance for GDPR / CCPA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.