Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v959-qxv6-6f8p | ZITADEL Vulnerable to Account Takeover via DOM-Based XSS in Zitadel V2 Login |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zitadel
Zitadel zitadel |
|
| Vendors & Products |
Zitadel
Zitadel zitadel |
Wed, 10 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1. | |
| Title | ZITADEL Vulnerable to Account Takeover via DOM-Based XSS in Zitadel V2 Login | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-10T16:50:23.393Z
Reserved: 2025-12-08T20:58:24.640Z
Link: CVE-2025-67495
Updated: 2025-12-10T16:13:50.287Z
Status : Received
Published: 2025-12-09T23:15:59.933
Modified: 2025-12-09T23:15:59.933
Link: CVE-2025-67495
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:49:11Z
Github GHSA