Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Discord to introduce age verification for full access to platform next month

Turning lignocellulosic biomass into sustainable fuel for transportation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » oneLogin bug attacker use API key to steal OIDC secrets and impersonate app
Identity

oneLogin bug attacker use API key to steal OIDC secrets and impersonate app

userBy userOctober 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 1, 2025Ravi LakshmananVulnerability / API Security

One identity Onelogin Identity and Access Management (IAM) solution is revealed in which, under certain circumstances, client secrets can be exposed for sensitive OpenID Connect (OIDC) applications, if exploited smoothly.

The vulnerability tracked as CVE-2025-59363 has been assigned a CVSS score of 7.7 out of 10.0. This is said to be the case of false resource transfers between spheres (CWE-669), where programs cross security perimeters and obtain unauthorized access to sensitive data or functions.

CVE-2025-59363 “Attackers with valid API credentials allow them to enumerate and retrieve client secrets for all OIDC applications within an organization’s Onelogin tenant.”

DFIR Retainer Service

Identity Security said the problem stems from the fact that the client_secret value in the API response contains metadata related to the app in the OneLogin account, and the endpoint listing the application (/API/2/App) is configured to return more data than expected.

Here are the steps to pull out an attack:

Attackers authenticate request access tokens using valid OneLogin API credentials (client ID and secret) / API/2/App endpoints to list all applications

The successful exploitation of the flaws will allow an attacker with valid Onelogin API credentials to retrieve the client secrets for all OIDC applications configured within the OneLogin tenant. Armed with this access, threat actors were able to leverage exposed secrets to impersonate users and access other applications, providing opportunities for lateral movement.

OneLogin Role-Based Access Control (RBAC) grants endpoint access that extends the API key. This means that you can access sensitive endpoints across the platform using compromised credentials. Furthermore, compounding interest is the lack of IP addresses that IP addresses allow, which allows attackers to exploit the flaws from anywhere in the world, Clutch says.

CIS Build Kit

Following the responsible disclosure on July 18, 2025, the vulnerability was addressed in Onelogin 2025.3.0. There is no evidence that this issue has been misused in the wild.

“Protecting our customers is our number one priority and we appreciate the responsible disclosures by Clutch Security,” Vice President of Onelogin’s One Identity told Hacker News. “The reported vulnerabilities have been resolved within a reasonable time frame with the release of Onelogin 2025.3.0. To our knowledge, no customers were affected by this vulnerability.”

“Identity providers act as the backbone of the enterprise security architecture,” Clutch Security said. “The vulnerabilities in these systems can have a cascading effect across the technology stack, making strict API security essential.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle updates home apps with Gemini Smarts
Next Article Data breaches at Canadian airline Westjet affect 12 million passengers
user
  • Website

Related Posts

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026

AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Discord to introduce age verification for full access to platform next month

Turning lignocellulosic biomass into sustainable fuel for transportation

TechCrunch Founders Summit 2026 | TechCrunch

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.