Zitadel

18 CVEs product

Monthly

CVE-2026-32132 HIGH This Week

ZITADEL is an open source identity management platform. versions up to 3.4.8 is affected by insufficient session expiration (CVSS 7.4).

Information Disclosure Zitadel
NVD GitHub VulDB
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-32131 HIGH This Week

ZITADEL is an open source identity management platform. versions up to 3.4.8 is affected by authorization bypass through user-controlled key (CVSS 7.7).

Authentication Bypass Zitadel
NVD GitHub VulDB
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-32130 HIGH This Week

ZITADEL is an open source identity management platform. From 2.68.0 to versions up to 3.4.8 contains a security vulnerability (CVSS 7.5).

Information Disclosure Zitadel
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-29193 HIGH PATCH This Week

ZITADEL is an open source identity management platform. [CVSS 8.2 HIGH]

Authentication Bypass Zitadel
NVD GitHub
CVSS 3.1
8.2
EPSS
0.0%
CVE-2026-29192 HIGH PATCH This Week

Account takeover in Zitadel versions 4.0.0 through 4.11.1 is possible through improper redirect URI validation in the login V2 interface, allowing attackers with high privileges to compromise user accounts. This cross-site scripting vulnerability affects organizations using the vulnerable Zitadel identity management platform and has been resolved in version 4.12.0.

XSS Zitadel
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-29191 CRITICAL PATCH Act Now

Stored XSS in ZITADEL identity management platform versions 4.0.0 to 4.11.1 allows unauthenticated attackers to inject persistent scripts through the login flow. Patch available.

XSS Zitadel
NVD GitHub
CVSS 3.1
9.3
EPSS
0.0%
CVE-2026-29067 HIGH PATCH This Week

ZITADEL versions 4.0.0-rc.1 through 4.7.0 are vulnerable to open redirect attacks through improper validation of the Forwarded and X-Forwarded-Host headers used in password reset links. An attacker can craft a malicious request to redirect users to an attacker-controlled domain when they click password reset confirmation links, enabling credential harvesting or phishing attacks. The vulnerability affects all deployments using affected versions and has been patched in version 4.7.1.

Open Redirect Zitadel
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-27946 MEDIUM PATCH GHSA This Month

Zitadel versions prior to 4.11.1 and 3.4.7 permit authenticated users to bypass email and phone verification procedures through the self-management feature, allowing them to mark contact information as verified without completing actual validation. This integrity bypass enables account compromise scenarios where attackers with valid credentials can impersonate other users or escalate privileges by falsifying verified contact details. No patch is currently available for affected deployments, though implementing action rules (v2) can mitigate the risk.

Authentication Bypass Zitadel Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27945 MEDIUM PATCH This Month

Server-Side Request Forgery in Zitadel's Action V2 webhook feature allows unauthenticated attackers to probe internal network services and gather information about internal infrastructure by crafting malicious webhook target URLs pointing to localhost or private IP addresses. The vulnerability affects Zitadel versions 4.0.0 through 4.11.0, with schema validation providing limited mitigation. No patch is currently available.

SSRF Zitadel Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27840 MEDIUM PATCH This Month

Zitadel versions 2.31.0 through 3.4.6 and 4.10.x accept truncated opaque OIDC access tokens as valid when shortened to 80 characters, allowing attackers to bypass token validation and gain unauthorized access to protected resources. This affects deployments using the v2 token format where the symmetric encryption scheme fails to properly validate token length, enabling token forgery or reuse attacks.

Information Disclosure Zitadel Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-23511 MEDIUM PATCH This Month

Zitadel versions prior to 4.9.1 and 3.4.6 contain a user enumeration vulnerability in their login interfaces that allows unauthenticated attackers to discover valid user accounts by testing usernames and user IDs. An attacker can leverage this information disclosure to build lists of existing users for targeted attacks against the identity management platform. The vulnerability has been patched in versions 4.9.1 and 3.4.6.

Information Disclosure Zitadel Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-64717 HIGH PATCH This Month

ZITADEL is an open source identity management platform. Rated high severity (CVSS 7.4), this vulnerability is remotely exploitable, low attack complexity. This Improper Authentication vulnerability could allow attackers to bypass authentication mechanisms to gain unauthorized access.

Authentication Bypass Zitadel
NVD GitHub
CVSS 4.0
7.4
EPSS
0.6%
CVE-2025-57770 MEDIUM PATCH This Month

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Authentication Bypass Zitadel
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-48936 HIGH PATCH This Month

Zitadel is open-source identity infrastructure software. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Open Redirect vulnerability could allow attackers to redirect users to malicious websites via URL manipulation.

Open Redirect Authentication Bypass Zitadel
NVD GitHub
CVSS 3.1
8.1
EPSS
0.2%
CVE-2025-46815 HIGH PATCH This Week

The identity infrastructure software ZITADEL offers developers the ability to manage user sessions using the Session API. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, no authentication required.

Information Disclosure Zitadel Suse
NVD GitHub
CVSS 3.1
8.0
EPSS
0.2%
CVE-2025-31124 MEDIUM PATCH This Month

Zitadel is open-source identity infrastructure software. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Exposure of Sensitive Information vulnerability could allow attackers to access sensitive data that should not be disclosed.

Information Disclosure Zitadel
NVD GitHub
CVSS 3.1
5.3
EPSS
0.6%
CVE-2025-31123 HIGH PATCH This Week

Zitadel is open-source identity infrastructure software. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Zitadel
NVD GitHub
CVSS 3.1
8.7
EPSS
0.3%
CVE-2025-27507 CRITICAL PATCH Act Now

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, low attack complexity.

Authentication Bypass Zitadel Suse
NVD GitHub
CVSS 3.1
9.0
EPSS
0.3%
CVE-2026-32132
EPSS 0% CVSS 7.4
HIGH This Week

ZITADEL is an open source identity management platform. versions up to 3.4.8 is affected by insufficient session expiration (CVSS 7.4).

Information Disclosure Zitadel
NVD GitHub VulDB
CVE-2026-32131
EPSS 0% CVSS 7.7
HIGH This Week

ZITADEL is an open source identity management platform. versions up to 3.4.8 is affected by authorization bypass through user-controlled key (CVSS 7.7).

Authentication Bypass Zitadel
NVD GitHub VulDB
CVE-2026-32130
EPSS 0% CVSS 7.5
HIGH This Week

ZITADEL is an open source identity management platform. From 2.68.0 to versions up to 3.4.8 contains a security vulnerability (CVSS 7.5).

Information Disclosure Zitadel
NVD GitHub VulDB
CVE-2026-29193
EPSS 0% CVSS 8.2
HIGH PATCH This Week

ZITADEL is an open source identity management platform. [CVSS 8.2 HIGH]

Authentication Bypass Zitadel
NVD GitHub
CVE-2026-29192
EPSS 0% CVSS 7.7
HIGH PATCH This Week

Account takeover in Zitadel versions 4.0.0 through 4.11.1 is possible through improper redirect URI validation in the login V2 interface, allowing attackers with high privileges to compromise user accounts. This cross-site scripting vulnerability affects organizations using the vulnerable Zitadel identity management platform and has been resolved in version 4.12.0.

XSS Zitadel
NVD GitHub
CVE-2026-29191
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

Stored XSS in ZITADEL identity management platform versions 4.0.0 to 4.11.1 allows unauthenticated attackers to inject persistent scripts through the login flow. Patch available.

XSS Zitadel
NVD GitHub
CVE-2026-29067
EPSS 0% CVSS 8.1
HIGH PATCH This Week

ZITADEL versions 4.0.0-rc.1 through 4.7.0 are vulnerable to open redirect attacks through improper validation of the Forwarded and X-Forwarded-Host headers used in password reset links. An attacker can craft a malicious request to redirect users to an attacker-controlled domain when they click password reset confirmation links, enabling credential harvesting or phishing attacks. The vulnerability affects all deployments using affected versions and has been patched in version 4.7.1.

Open Redirect Zitadel
NVD GitHub
CVE-2026-27946
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Zitadel versions prior to 4.11.1 and 3.4.7 permit authenticated users to bypass email and phone verification procedures through the self-management feature, allowing them to mark contact information as verified without completing actual validation. This integrity bypass enables account compromise scenarios where attackers with valid credentials can impersonate other users or escalate privileges by falsifying verified contact details. No patch is currently available for affected deployments, though implementing action rules (v2) can mitigate the risk.

Authentication Bypass Zitadel Suse
NVD GitHub
CVE-2026-27945
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Server-Side Request Forgery in Zitadel's Action V2 webhook feature allows unauthenticated attackers to probe internal network services and gather information about internal infrastructure by crafting malicious webhook target URLs pointing to localhost or private IP addresses. The vulnerability affects Zitadel versions 4.0.0 through 4.11.0, with schema validation providing limited mitigation. No patch is currently available.

SSRF Zitadel Suse
NVD GitHub
CVE-2026-27840
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Zitadel versions 2.31.0 through 3.4.6 and 4.10.x accept truncated opaque OIDC access tokens as valid when shortened to 80 characters, allowing attackers to bypass token validation and gain unauthorized access to protected resources. This affects deployments using the v2 token format where the symmetric encryption scheme fails to properly validate token length, enabling token forgery or reuse attacks.

Information Disclosure Zitadel Suse
NVD GitHub
CVE-2026-23511
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Zitadel versions prior to 4.9.1 and 3.4.6 contain a user enumeration vulnerability in their login interfaces that allows unauthenticated attackers to discover valid user accounts by testing usernames and user IDs. An attacker can leverage this information disclosure to build lists of existing users for targeted attacks against the identity management platform. The vulnerability has been patched in versions 4.9.1 and 3.4.6.

Information Disclosure Zitadel Suse
NVD GitHub
CVE-2025-64717
EPSS 1% CVSS 7.4
HIGH PATCH This Month

ZITADEL is an open source identity management platform. Rated high severity (CVSS 7.4), this vulnerability is remotely exploitable, low attack complexity. This Improper Authentication vulnerability could allow attackers to bypass authentication mechanisms to gain unauthorized access.

Authentication Bypass Zitadel
NVD GitHub
CVE-2025-57770
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Authentication Bypass Zitadel
NVD GitHub
CVE-2025-48936
EPSS 0% CVSS 8.1
HIGH PATCH This Month

Zitadel is open-source identity infrastructure software. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Open Redirect vulnerability could allow attackers to redirect users to malicious websites via URL manipulation.

Open Redirect Authentication Bypass Zitadel
NVD GitHub
CVE-2025-46815
EPSS 0% CVSS 8.0
HIGH PATCH This Week

The identity infrastructure software ZITADEL offers developers the ability to manage user sessions using the Session API. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, no authentication required.

Information Disclosure Zitadel Suse
NVD GitHub
CVE-2025-31124
EPSS 1% CVSS 5.3
MEDIUM PATCH This Month

Zitadel is open-source identity infrastructure software. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Exposure of Sensitive Information vulnerability could allow attackers to access sensitive data that should not be disclosed.

Information Disclosure Zitadel
NVD GitHub
CVE-2025-31123
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Zitadel is open-source identity infrastructure software. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Zitadel
NVD GitHub
CVE-2025-27507
EPSS 0% CVSS 9.0
CRITICAL PATCH Act Now

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, low attack complexity.

Authentication Bypass Zitadel Suse
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy