8.7

CVE-2025-31123

Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
ZitadelZitadel Version >= 2.62.0 < 2.63.9
ZitadelZitadel Version >= 2.64.0 < 2.64.6
ZitadelZitadel Version >= 2.65.0 < 2.65.7
ZitadelZitadel Version >= 2.66.0 < 2.66.16
ZitadelZitadel Version >= 2.67.0 < 2.67.13
ZitadelZitadel Version >= 2.68.0 < 2.68.9
ZitadelZitadel Version >= 2.69.0 < 2.69.9
ZitadelZitadel Version >= 2.70.0 < 2.70.8
ZitadelZitadel Version >= 2.71.0 < 2.71.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.09% 0.257
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security-advisories@github.com 8.7 2.3 5.8
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
CWE-324 Use of a Key Past its Expiration Date

The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.