PT-2025-29579 · Zitadel · Zitadel

Livio

+1

·

Published

2025-07-15

·

Updated

2025-07-15

·

CVE-2025-53895

CVSS v4.0
7.7
VectorAV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions:

ZITADEL versions prior to 4.0.0-rc.2

ZITADEL versions prior to 3.3.2

ZITADEL versions prior to 2.71.13

ZITADEL versions prior to 2.70.14

ZITADEL versions 2.53.0 through 3.3.1

Description:

ZITADEL’s session management API has a flaw where an authenticated user can update a session knowing only its ID, due to a missing permission check. This enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources.

Recommendations:

Update ZITADEL to version 4.0.0-rc.2 or later.

Update ZITADEL to version 3.3.2 or later.

Update ZITADEL to version 2.71.13 or later.

Update ZITADEL to version 2.70.14 or later.

Fix

Incorrect Authorization

Session Fixation

Weakness Enumeration

Related Identifiers

CVE-2025-53895
GHSA-6C5P-6WWW-PCMR

Affected Products

Zitadel