If the "claimsparametersupported" parameter is activated, it is possible through the "oidc-claims-extension.groovy" script, to inject the value of choice into a claim contained in the idtoken or in the userinfo. Authorization function requests do not prevent a claims parameter containing a JSON file to be injected. This JSON file allows users to customize claims returned by the "idtoken" and "userinfo" files. This allows for a very wide range of vulnerabilities depending on how clients use claims. For example, if some clients rely on an email field to identify a user, users can choose to entera any email address, and therefore assume any chosen identity.
{
"github_reviewed": true,
"severity": "HIGH",
"cwe_ids": [
"CWE-74",
"CWE-94"
],
"nvd_published_at": "2025-11-12T19:15:38Z",
"github_reviewed_at": "2025-11-12T21:27:22Z"
}