Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.7
Zitadel login interface allows account takeover via default redirect
GHSA-6rx5-m2rc-hmf7
CVE-2026-29192
GHSA-6rx5-m2rc-hmf7
Summary
Zitadel's identity management platform had a flaw in its login system from version 4.0.0 to 4.11.1. This meant that an attacker could potentially take control of user accounts. The issue has been fixed in version 4.12.0, so update to this version to protect your users.
What to do
- Update github.com zitadel to version 4.12.0.
- Update zitadel github.com/zitadel/zitadel/v2 to version 4.12.0.
- Update zitadel github.com/zitadel/zitadel to version 4.12.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| github.com | zitadel | > 4.0.0 , <= 4.12.0 | 4.12.0 |
| github.com | zitadel | > 4.0.0 , <= 4.12.0 | 4.12.0 |
| zitadel | github.com/zitadel/zitadel/v2 | > 4.0.0 , <= 4.12.0 | 4.12.0 |
| zitadel | github.com/zitadel/zitadel | > 4.0.0 , <= 4.12.0 | 4.12.0 |
| zitadel | zitadel | > 4.0.0 , <= 4.12.0 | – |
Original title
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via Def...
Original description
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via Default URI Redirect. This issue has been patched in version 4.12.0.
ghsa CVSS3.1
7.7
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026