VYPR
High severityNVD Advisory· Published Mar 11, 2025· Updated Feb 13, 2026

ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability

CVE-2025-24070

Description

Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Weak authentication in ASP.NET Core's RefreshSignInAsync allows an attacker to sign into another user's account, leading to elevation of privilege.

Vulnerability

Overview

CVE-2025-24070 is a weak authentication vulnerability in ASP.NET Core and Microsoft.AspNetCore.Identity. The flaw occurs when an application calls the RefreshSignInAsync method with an improperly authenticated user parameter. This insufficient proof of identity, as defined by CWE-1390, could allow an unauthorized attacker to sign into another user's account over a network [1][2].

Exploitation

Prerequisites

To exploit this vulnerability, an attacker must be able to send crafted network requests to an affected ASP.NET Core application that utilizes the RefreshSignInAsync method. No specific authentication or additional privileges are mentioned as prerequisites, meaning the attack can be launched remotely without prior access [1]. The vulnerability affects ASP.NET Core 6.0.0 through 6.0.36, 8.0.0 through 8.0.13, 9.0.0 through 9.0.2, and the Microsoft.AspNetCore.Identity package version 2.3.0 and earlier [1][2].

Impact

Successful exploitation results in an elevation of privilege, where the attacker can assume the identity of another user. This could lead to unauthorized access to sensitive data or actions performed under the guise of a legitimate user, compromising the application's security posture [1].

Mitigation

Microsoft has released patched versions to address this vulnerability. For ASP.NET Core 9.0, the fix is included in version 9.0.3; for 8.0, version 8.0.14; and for 6.0, version 6.0.37. The Microsoft.AspNetCore.Identity package is patched in version 2.3.1. Developers are advised to update their applications immediately [1][2]. No known workarounds are available, as Microsoft stated there are no mitigating factors [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Microsoft.AspNetCore.IdentityNuGet
>= 2.3.0, < 2.3.12.3.1
Microsoft.AspNetCore.App.Runtime.linux-armNuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.linux-armNuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.win-armNuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.win-armNuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.win-x64NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.win-x64NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.win-x86NuGet
>= 8.0.0, < 8.0.148.0.14
Microsoft.AspNetCore.App.Runtime.win-x86NuGet
>= 9.0.0, < 9.0.39.0.3
Microsoft.AspNetCore.App.Runtime.linux-armNuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.linux-arm64NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.linux-musl-armNuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.linux-musl-x64NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.osx-arm64NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.osx-x64NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.win-armNuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.win-arm64NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.win-x64NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.win-x86NuGet
>= 6.0.0, <= 6.0.36
Microsoft.AspNetCore.App.Runtime.linux-x64NuGet
>= 6.0.0, <= 6.0.36

Affected products

48

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.