Untriaged
Permalink
CVE-2026-23511
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
ZITADEL has a user enumeration vulnerability in Login UIs
ZITADEL is an open source identity management platform. Prior to 4.9.1 and 3.4.6, a user enumeration vulnerability has been discovered in Zitadel's login interfaces. An unauthenticated attacker can exploit this flaw to confirm the existence of valid user accounts by iterating through usernames and userIDs. This vulnerability is fixed in 4.9.1 and 3.4.6.
References
-
https://github.com/zitadel/zitadel/security/advisories/GHSA-pvm5-9frx-264r x_refsource_CONFIRM
-
https://github.com/zitadel/zitadel/releases/tag/v3.4.6 x_refsource_MISC
-
https://github.com/zitadel/zitadel/releases/tag/v4.9.1 x_refsource_MISC
Affected products
zitadel
- ==>= 4.0.0, < 4.9.1
- ==< 3.4.6
Package maintainers
-
@nrabulinski Nikodem Rabuliński <1337-nix@nrab.lol>