ZITADEL is an open source identity management system. Starting in version 2.53.0 and prior to versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14, vulnerability in ZITADEL's session management API allows any authenticated user to update a session if they know its ID, due to a missing permission check. This flaw enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources. Versions prior to `2.53.0` are not affected, as they required the session token for updates. Versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14 fix the issue.
References
| Link | Resource |
|---|---|
| https://github.com/zitadel/zitadel/releases/tag/v2.70.14 | Release Notes |
| https://github.com/zitadel/zitadel/releases/tag/v2.71.13 | Release Notes |
| https://github.com/zitadel/zitadel/releases/tag/v3.3.2 | Release Notes |
| https://github.com/zitadel/zitadel/releases/tag/v4.0.0-rc.2 | Release Notes |
| https://github.com/zitadel/zitadel/security/advisories/GHSA-6c5p-6www-pcmr | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-07-15 17:15
Updated : 2025-08-26 17:52
NVD link : CVE-2025-53895
Mitre link : CVE-2025-53895
CVE.ORG link : CVE-2025-53895
JSON object : View
Products Affected
zitadel
- zitadel
