CVE-2026-29067

Critical
|9.3
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker can exploit a flaw in ZITADEL's password reset process to potentially intercept or manipulate the confirmation link sent to users, allowing them to reset passwords without authorization. This vulnerability affects versions from 4.0.0-rc.1 to 4.7.0 and requires the attacker to be able to send requests that include specific headers to the server.

Technical Description

ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References