Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-27507


The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do not utilize LDAP for authentication are not at risk from the most severe aspects of this vulnerability. However, upgrading to the patched version to address all identified issues is strongly recommended. This vulnerability is fixed in 2.71.0, 2.70.1, ,2.69.4, 2.68.4, 2.67.8, 2.66.11, 2.65.6, 2.64.5, and 2.63.8.


Published

2025-03-04T17:15:20.360

Last Modified

2025-08-26T17:15:22.317

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.0 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-639

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application zitadel zitadel < 2.63.8 Yes
Application zitadel zitadel < 2.64.5 Yes
Application zitadel zitadel < 2.65.6 Yes
Application zitadel zitadel < 2.66.11 Yes
Application zitadel zitadel < 2.67.8 Yes
Application zitadel zitadel < 2.68.4 Yes
Application zitadel zitadel < 2.69.4 Yes
Application zitadel zitadel < 2.70.1 Yes

References