Impact
ZITadel, an open source identity management platform, issued opaque OIDC access tokens in a v2 format that were truncated to 80 characters. Because the system ignored the user ID part of the token payload during verification, truncated tokens were still accepted as valid. While the missing user ID could theoretically suggest an authentication flaw, the vendor states that the issue is not considered exploitable and does not grant any unauthorized privileges.
Affected Systems
The vulnerability affects Zitadel versions starting from 2.31.0 up to, but not including, 3.4.7 and 4.11.0. Systems running any of these unpatched releases should be considered potentially exposed to the issue.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate risk level, and the low EPSS score (<1%) suggests an unlikely exploit. The vulnerability is not listed in CISA’s KEV catalog, and no public exploits have been observed. The likely attack vector involves an attacker crafting a truncated token and presenting it to a Zitadel deployment that has not applied the 3.4.7 or 4.11.0 patch. Because the bug does not grant additional privileges, it is considered non-exploitable under current information.
OpenCVE Enrichment
Github GHSA