CVE-2026-27946
- EPSS 0.04%
- Veröffentlicht 26.02.2026 00:34:56
- Zuletzt bearbeitet 27.02.2026 14:06:59
ZITADEL is an open source identity management platform. Prior to versions 4.11.1 and 3.4.7, a vulnerability in Zitadel's self-management capability allowed users to mark their email and phone as verified without going through an actual verification p...
CVE-2026-27945
- EPSS 0.03%
- Veröffentlicht 26.02.2026 00:29:58
- Zuletzt bearbeitet 27.02.2026 14:06:59
ZITADEL is an open source identity management platform. Zitadel Action V2 (introduced as early preview in 2.59.0, beta in 3.0.0 and GA in 4.0.0) is a webhook based approach to allow developers act on API request to Zitadel and customize flows such th...
CVE-2026-27840
- EPSS 0.02%
- Veröffentlicht 26.02.2026 00:27:08
- Zuletzt bearbeitet 27.02.2026 14:06:59
ZITADEL is an open source identity management platform. Starting in version 2.31.0 and prior to versions 3.4.7 and 4.11.0, opaque OIDC access tokens in the v2 format truncated to 80 characters are still considered valid. Zitadel uses a symmetric AES...
CVE-2026-23511
- EPSS 0.02%
- Veröffentlicht 15.01.2026 19:09:06
- Zuletzt bearbeitet 20.01.2026 16:44:43
ZITADEL is an open source identity management platform. Prior to 4.9.1 and 3.4.6, a user enumeration vulnerability has been discovered in Zitadel's login interfaces. An unauthenticated attacker can exploit this flaw to confirm the existence of valid ...
CVE-2025-67717
- EPSS 0.04%
- Veröffentlicht 11.12.2025 00:30:19
- Zuletzt bearbeitet 02.02.2026 15:10:37
ZITADEL is an open-source identity infrastructure tool. Versions 2.44.0 through 3.4.4 and 4.0.0-rc.1 through 4.7.1 disclose the total number of instance users to authenticated users, regardless of their specific permissions. While this does not leak ...
CVE-2025-67495
- EPSS 0.06%
- Veröffentlicht 09.12.2025 22:38:44
- Zuletzt bearbeitet 19.12.2025 18:30:55
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_re...
CVE-2025-67494
- EPSS 0.03%
- Veröffentlicht 09.12.2025 22:16:16
- Zuletzt bearbeitet 19.12.2025 18:53:34
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all depl...
CVE-2025-64717
- EPSS 0.48%
- Veröffentlicht 13.11.2025 15:30:51
- Zuletzt bearbeitet 04.12.2025 14:39:53
ZITADEL is an open source identity management platform. Starting in version 2.50.0 and prior to versions 2.71.19, 3.4.4, and 4.6.6, a vulnerability in ZITADEL's federation process allowed auto-linking users from external identity providers to existin...
CVE-2025-64431
- EPSS 0.05%
- Veröffentlicht 07.11.2025 18:09:25
- Zuletzt bearbeitet 12.11.2025 16:20:22
Zitadel is an open source identity management platform. Versions 4.0.0-rc.1 through 4.6.2 are vulnerable to secure Direct Object Reference (IDOR) attacks through its V2Beta API, allowing authenticated users with specific administrator roles within on...
CVE-2025-64103
- EPSS 0.15%
- Veröffentlicht 29.10.2025 18:43:46
- Zuletzt bearbeitet 04.11.2025 13:17:27
Starting from 2.53.6, 2.54.3, and 2.55.0, Zitadel only required multi factor authentication in case the login policy has either enabled requireMFA or requireMFAForLocalUsers. If a user has set up MFA without this requirement, Zitadel would consider s...