Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.2
ZITADEL Users Can Fake Email and Phone Verification
CVE-2026-27946
GHSA-282g-fhmx-xf54
Summary
A mistake in ZITADEL's user management system allowed users to claim ownership of email and phone numbers without actually verifying them. This could be used to bypass security checks. Update to the latest version to fix the issue.
What to do
- Update github.com zitadel to version 4.11.1.
- Update github.com zitadel to version 3.4.7.
- Update github.com zitadel to version 1.80.0-v2.20.0.20260225053417-0261536243e5.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| github.com | zitadel | > 4.0.0 , <= 4.11.0 | 4.11.1 |
| github.com | zitadel | > 2.43.0 , <= 3.4.7 | 3.4.7 |
| github.com | zitadel | <= 1.80.0-v2.20.0.20260225053417-0261536243e5 | 1.80.0-v2.20.0.20260225053417-0261536243e5 |
| zitadel | zitadel | <= 3.4.7 | – |
| zitadel | zitadel | > 4.0.0 , <= 4.11.0 | – |
Original title
ZITADEL Users Can Self-Verify Email/Phone via UpdateHumanUser API
Original description
### Summary
A vulnerability in ZITADEL's self-management capability allowed users to mark their email and phone as verified without going through an actual verification process.
### Impact
ZITADEL provides an API for managing users. The API also allows users to self-manage their own data including updating the email and phone.
Due to an improper permission check, the API allowed setting the verified flag for the email and phone on the own user.
This allows users to claim ownership of an email or phone they do not control and potentially bypass email-based security policies.
Note that when changing another user's email or phone, regardless of the verification flag, the permissions were correctly checked.
### Affected Versions
Systems running one of the following versions are affected:
- **4.x**: `4.0.0` through `4.11.0` (including RC versions)
- **3.x**: `3.0.0` through `3.4.6` (including RC versions)
- **2.x**: `2.43.0` through `2.71.19`
### Patches
The vulnerability has been addressed in the latest releases. The patch resolves the issue by requiring the correct permission in case the verification flag is provided and only allows self-management of the email address, resp. phone number itself.
4.x: Upgrade to >=[4.11.1](https://github.com/zitadel/zitadel/releases/tag/v4.11.1)
3.x: Update to >=[3.4.7](https://github.com/zitadel/zitadel/releases/tag/v3.4.7)
2.x: Update to >=[3.4.7](https://github.com/zitadel/zitadel/releases/tag/v3.4.7)
### Workarounds
The recommended solution is to upgrade to a patched version. If an upgrade is not possible, an action (v2) could be used to prevent setting the verification flag on the own user.
### Questions
If there are any questions or comments about this advisory, please send an email to [[email protected]](mailto:[email protected])
A vulnerability in ZITADEL's self-management capability allowed users to mark their email and phone as verified without going through an actual verification process.
### Impact
ZITADEL provides an API for managing users. The API also allows users to self-manage their own data including updating the email and phone.
Due to an improper permission check, the API allowed setting the verified flag for the email and phone on the own user.
This allows users to claim ownership of an email or phone they do not control and potentially bypass email-based security policies.
Note that when changing another user's email or phone, regardless of the verification flag, the permissions were correctly checked.
### Affected Versions
Systems running one of the following versions are affected:
- **4.x**: `4.0.0` through `4.11.0` (including RC versions)
- **3.x**: `3.0.0` through `3.4.6` (including RC versions)
- **2.x**: `2.43.0` through `2.71.19`
### Patches
The vulnerability has been addressed in the latest releases. The patch resolves the issue by requiring the correct permission in case the verification flag is provided and only allows self-management of the email address, resp. phone number itself.
4.x: Upgrade to >=[4.11.1](https://github.com/zitadel/zitadel/releases/tag/v4.11.1)
3.x: Update to >=[3.4.7](https://github.com/zitadel/zitadel/releases/tag/v3.4.7)
2.x: Update to >=[3.4.7](https://github.com/zitadel/zitadel/releases/tag/v3.4.7)
### Workarounds
The recommended solution is to upgrade to a patched version. If an upgrade is not possible, an action (v2) could be used to prevent setting the verification flag on the own user.
### Questions
If there are any questions or comments about this advisory, please send an email to [[email protected]](mailto:[email protected])
nvd CVSS3.1
6.5
nvd CVSS4.0
8.2
Vulnerability type
CWE-862
Missing Authorization
- https://nvd.nist.gov/vuln/detail/CVE-2026-27946
- https://github.com/zitadel/zitadel/commit/0261536243e500dccfd8c7f547d592c8224783...
- https://github.com/zitadel/zitadel/releases/tag/v3.4.7
- https://github.com/zitadel/zitadel/releases/tag/v4.11.1
- https://github.com/advisories/GHSA-282g-fhmx-xf54
- https://github.com/zitadel/zitadel/security/advisories/GHSA-282g-fhmx-xf54 Vendor Advisory
Published: 27 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026