Untriaged
Permalink
CVE-2026-29193
8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
ZITADEL: Bypassing Zitadel Login Behavior and Security Policy in Login V2
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password even if corresponding options were disabled in their organizaton. This issue has been patched in version 4.12.1.
References
-
https://github.com/zitadel/zitadel/security/advisories/GHSA-25rw-g6ff-fmg8 x_refsource_CONFIRM
Affected products
zitadel
- ==>= 4.0.0, < 4.12.1
Matching in nixpkgs
pkgs.zitadel
Identity and access management platform
Package maintainers
-
@nrabulinski Nikodem Rabuliński <1337-nix@nrab.lol>