{"uuid": "542a4869-0c46-45f7-afa7-d95986d8d9ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27370", "type": "seen", "source": "https://t.me/cvedetector/19402", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27370 - OpenID Connect Core through errata set 2 Audience Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27370 \nPublished : March 3, 2025, 6:15 p.m. | 2\u00a0hours, 5\u00a0minutes ago \nDescription : OpenID Connect Core through 1.0 errata set 2 allows audience injection in certain situations. When the private_key_jwt authentication mechanism is used, a malicious Authorization Server could trick a Client into writing attacker-controlled values into the audience, including token endpoints or issuer identifiers of other Authorization Servers. The malicious Authorization Server could then use these private key JWTs to impersonate the Client. \nSeverity: 6.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T21:24:44.000000Z"}