CVE-2025-59363
OneLogin · OneLogin Multiple Products
A high-severity vulnerability has been discovered in multiple OneLogin products, identified as CVE-2025-59363.
Executive summary
A high-severity vulnerability has been discovered in multiple OneLogin products, identified as CVE-2025-59363. This flaw could allow an authenticated attacker to escalate their privileges, potentially gaining administrative access to connected applications and services. Successful exploitation could lead to widespread unauthorized access, data breaches, and disruption of business operations that rely on OneLogin for authentication.
Vulnerability
This vulnerability is a privilege escalation flaw resulting from improper validation of user role attributes during the authentication workflow. An authenticated attacker with low-level privileges can manipulate specific session parameters or tokens post-authentication. By crafting a malicious request to the identity service, the attacker can trick the system into granting them a role with higher privileges, such as that of an administrator, bypassing normal authorization checks.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.7. A successful exploit would have a significant business impact, as OneLogin serves as a central identity provider for many critical business applications. An attacker escalating privileges to an administrative level could gain unauthorized access to sensitive corporate data, customer information, and financial systems. This could lead to major data exfiltration, intellectual property theft, fraudulent activities, and a complete compromise of the organization's identity and access management infrastructure, resulting in severe reputational and financial damage.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected OneLogin instances immediately. Prior to full deployment, test the patches in a non-production environment to ensure compatibility. In parallel, initiate a review of all administrative access logs to identify any signs of compromise preceding the patch application.
Proactive Monitoring: Security teams should actively monitor OneLogin audit logs for anomalous activity, specifically looking for unexpected or unauthorized changes to user roles and permissions. Implement alerts for any user being added to a high-privilege group or for administrative actions originating from non-standard user accounts or IP addresses. Review logs in downstream applications for evidence of privileged commands being executed by users who should not have such access.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. Enforce stringent Multi-Factor Authentication (MFA) on all accounts, especially for administrative access. Apply the principle of least privilege by auditing and removing any unnecessary permissions from user accounts. Consider temporarily restricting administrative functions to a minimal set of trusted users operating from secured, IP-whitelisted locations.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical role of OneLogin in the enterprise security infrastructure, this vulnerability presents a severe risk to the organization. The potential for an attacker to gain administrative control over federated applications necessitates an urgent response. We strongly recommend that this vulnerability be treated as a top priority for immediate patching. Although not yet listed on the CISA KEV catalog, its high CVSS score and potential for widespread impact make it a prime candidate for future inclusion, underscoring the need to remediate without delay.