Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-64102


Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.


Published

2025-10-29T19:15:38.927

Last Modified

2025-11-04T13:18:57.337

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-307

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application zitadel zitadel < 2.71.18 Yes
Application zitadel zitadel < 3.4.3 Yes
Application zitadel zitadel < 4.6.0 Yes

References