CVE-2025-53895

ZITADEL is an open source identity management system. Starting in version 2.53.0 and prior to versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14, vulnerability in ZITADEL's session management API allows any authenticated user to update a session if they know its ID, due to a missing permission check. This flaw enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources. Versions prior to `2.53.0` are not affected, as they required the session token for updates. Versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14 fix the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:4.0.0:rc1:*:*:*:*:*:*

History

No history.

Information

Published : 2025-07-15 17:15

Updated : 2025-08-26 17:52


NVD link : CVE-2025-53895

Mitre link : CVE-2025-53895

CVE.ORG link : CVE-2025-53895


JSON object : View

Products Affected

zitadel

  • zitadel
CWE
CWE-384

Session Fixation

CWE-863

Incorrect Authorization