CVE-2024-21643
C# vulnerability analysis and mitigation

Overview

CVE-2024-21643 affects IdentityModel Extensions for .NET, a framework used by web developers for federated identity providers. The vulnerability exists in the SignedHttpRequest protocol where Microsoft.IdentityModel trusts the jku claim by default, potentially allowing remote or local HTTP GET requests. The issue was discovered and disclosed in January 2024, affecting all versions prior to 7.1.2 (for 7x) and 6.34.0 (for 6x) (GitHub Advisory).

Technical details

The vulnerability stems from Microsoft.IdentityModel's default trust of the jku claim in the SignedHttpRequest protocol. This affects anyone using the SignedHttpRequest protocol or the SignedHttpRequestValidator. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating high potential impact on confidentiality, integrity, and availability (NVD).

Impact

The vulnerability allows attackers to make any remote or local HTTP GET request through the SignedHttpRequest protocol, potentially leading to remote code execution. This could compromise the security of applications using the affected components for federated identity management (GitHub Advisory).

Mitigation and workarounds

Users should update all their Microsoft.IdentityModel versions to 7.1.2 (for 7x) or higher, 6.34.0 (for 6x) or higher. For teams requiring the use of the jku claim, the only potentially safe approach is to limit trusted domains using the new properties: AllowResolvingPopKeyFromJku (defaults to false) and AllowedDomainsForJkuRetrieval. Without upgrading, organizations can disable or filter outbound HTTP requests at the firewall (Microsoft Wiki).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68924HIGH7.5
  • C#C#
  • UmbracoForms
NoNoJan 16, 2026
CVE-2025-68618HIGH7.5
  • C#C#
  • Magick.NET-Q8-arm64
NoYesDec 30, 2025
CVE-2021-47776MEDIUM6.9
  • C#C#
  • UmbracoCms
NoNoJan 15, 2026
CVE-2025-68950MEDIUM6.2
  • C#C#
  • perl-PerlMagick
NoYesDec 30, 2025
CVE-2025-67291MEDIUM6.1
  • C#C#
  • Piranha
NoNoDec 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management