Access Control Vulnerability in PingIDM Affects Client Mode Configuration
CVE-2025-20628

6.9MEDIUM

Key Information:

Status
Vendor
CVE Published:
7 April 2026

What is CVE-2025-20628?

PingIDM, previously known as ForgeRock Identity Management, has a vulnerability that stems from insufficient granularity of access control. Administrators face challenges when configuring access rules for Remote Connector Servers (RCS) operating in client mode. This vulnerability allows attackers to potentially spoof an RCS, enabling them to intercept or modify critical identity-related information, including passwords and account recovery data. Exploitation is possible only if the RCS is specifically set to operate in client mode.

Affected Version(s)

PingIDM 7.5.0

PingIDM 7.4.0 <= 7.4.1

PingIDM 7.3.0 <= 7.3.1

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.