CVE-2025-64099

N/A Unknown

📋 TL;DR

This vulnerability in OpenAM allows attackers to inject arbitrary claims into identity tokens when the 'claims_parameter_supported' feature is enabled. Attackers can manipulate email addresses or other claim values to impersonate users, potentially bypassing authentication. Organizations using OpenAM versions before 16.0.0 with claims parameter support enabled are affected.

💻 Affected Systems

Products:
  • Open Identity Platform OpenAM
Versions: All versions prior to 16.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when 'claims_parameter_supported' parameter is activated/enabled in configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover and identity impersonation across all integrated applications, potentially leading to data breaches, privilege escalation, and unauthorized access to sensitive systems.

🟠

Likely Case

Targeted identity impersonation allowing attackers to access applications that rely on specific claim values for user identification, potentially compromising user accounts and sensitive data.

🟢

If Mitigated

Limited impact if claims are properly validated by downstream applications or if the vulnerable feature is disabled, though some risk remains from misconfigured clients.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to make OAuth/OIDC authorization requests and knowledge of the claims parameter feature being enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.0.0

Vendor Advisory: https://github.com/OpenIdentityPlatform/OpenAM/security/advisories/GHSA-39hr-239p-fhqc

Restart Required: Yes

Instructions:

1. Download OpenAM version 16.0.0 or later from official repository. 2. Backup current configuration and data. 3. Deploy new version following upgrade documentation. 4. Restart OpenAM services. 5. Verify functionality.

🔧 Temporary Workarounds

Disable claims_parameter_supported feature

all

Disable the vulnerable feature in OpenAM configuration to prevent exploitation.

Edit OpenAM configuration to set 'claims_parameter_supported' to false or remove from supported parameters list

🧯 If You Can't Patch

  • Implement strict claim validation in all client applications that consume OpenAM tokens
  • Deploy WAF rules to detect and block malicious claims parameter payloads in OAuth/OIDC requests

🔍 How to Verify

Check if Vulnerable:

Check OpenAM version and verify if 'claims_parameter_supported' parameter is enabled in configuration files or admin console.

Check Version:

Check OpenAM admin console or configuration files for version information, or use: java -jar openam-configurator-tool.jar --version

Verify Fix Applied:

Verify OpenAM version is 16.0.0 or later and test that claims parameter injection no longer works by attempting to inject custom claims.

📡 Detection & Monitoring

Log Indicators:

  • Unusual claims parameter values in OAuth/OIDC authorization requests
  • Multiple failed authentication attempts with modified claim values
  • Log entries showing claims parameter processing errors

Network Indicators:

  • HTTP requests to /oauth2/authorize endpoint with complex JSON in claims parameter
  • Unusual patterns in OAuth flow requests

SIEM Query:

source="openam" AND (message="*claims_parameter*" OR message="*oidc-claims-extension*") AND (message="*inject*" OR message="*malicious*" OR message="*error*")

🔗 References

📤 Share & Export