CVE-2026-27840
- EPSS 0.02%
- Veröffentlicht 26.02.2026 00:27:08
- Zuletzt bearbeitet 05.03.2026 16:04:57
ZITADEL is an open source identity management platform. Starting in version 2.31.0 and prior to versions 3.4.7 and 4.11.0, opaque OIDC access tokens in the v2 format truncated to 80 characters are still considered valid. Zitadel uses a symmetric AES...
CVE-2026-23511
- EPSS 0.02%
- Veröffentlicht 15.01.2026 19:09:06
- Zuletzt bearbeitet 20.01.2026 16:44:43
ZITADEL is an open source identity management platform. Prior to 4.9.1 and 3.4.6, a user enumeration vulnerability has been discovered in Zitadel's login interfaces. An unauthenticated attacker can exploit this flaw to confirm the existence of valid ...
CVE-2025-67717
- EPSS 0.04%
- Veröffentlicht 11.12.2025 00:30:19
- Zuletzt bearbeitet 02.02.2026 15:10:37
ZITADEL is an open-source identity infrastructure tool. Versions 2.44.0 through 3.4.4 and 4.0.0-rc.1 through 4.7.1 disclose the total number of instance users to authenticated users, regardless of their specific permissions. While this does not leak ...
CVE-2025-67495
- EPSS 0.07%
- Veröffentlicht 09.12.2025 22:38:44
- Zuletzt bearbeitet 19.12.2025 18:30:55
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_re...
CVE-2025-67494
- EPSS 0.04%
- Veröffentlicht 09.12.2025 22:16:16
- Zuletzt bearbeitet 19.12.2025 18:53:34
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all depl...
CVE-2025-64717
- EPSS 0.51%
- Veröffentlicht 13.11.2025 15:30:51
- Zuletzt bearbeitet 04.12.2025 14:39:53
ZITADEL is an open source identity management platform. Starting in version 2.50.0 and prior to versions 2.71.19, 3.4.4, and 4.6.6, a vulnerability in ZITADEL's federation process allowed auto-linking users from external identity providers to existin...
CVE-2025-64431
- EPSS 0.04%
- Veröffentlicht 07.11.2025 18:09:25
- Zuletzt bearbeitet 15.04.2026 00:35:42
Zitadel is an open source identity management platform. Versions 4.0.0-rc.1 through 4.6.2 are vulnerable to secure Direct Object Reference (IDOR) attacks through its V2Beta API, allowing authenticated users with specific administrator roles within on...
CVE-2025-64103
- EPSS 0.11%
- Veröffentlicht 29.10.2025 18:43:46
- Zuletzt bearbeitet 04.11.2025 13:17:27
Starting from 2.53.6, 2.54.3, and 2.55.0, Zitadel only required multi factor authentication in case the login policy has either enabled requireMFA or requireMFAForLocalUsers. If a user has set up MFA without this requirement, Zitadel would consider s...
CVE-2025-64102
- EPSS 0.04%
- Veröffentlicht 29.10.2025 18:36:15
- Zuletzt bearbeitet 04.11.2025 13:18:57
Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios lik...
CVE-2025-64101
- EPSS 0.08%
- Veröffentlicht 29.10.2025 18:30:14
- Zuletzt bearbeitet 04.11.2025 13:20:04
Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, a potential vulnerability exists in ZITADEL's password reset mechanism. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to c...