CVE-2026-29192

High
|7.7
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to take over user accounts by exploiting a flaw in Zitadel's login system, specifically through a default redirect link. It affects versions 4.0.0 to 4.11.1, so users need to upgrade to version 4.12.0 to protect themselves.

Technical Description

ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via Default URI Redirect. This issue has been patched in version 4.12.0.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References