Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-64103


Starting from 2.53.6, 2.54.3, and 2.55.0, Zitadel only required multi factor authentication in case the login policy has either enabled requireMFA or requireMFAForLocalUsers. If a user has set up MFA without this requirement, Zitadel would consider single factor auhtenticated sessions as valid as well and not require multiple factors. Bypassing second authentication factors weakens multifactor authentication and enables attackers to bypass the more secure factor. An attacker can target the TOTP code alone, only six digits, bypassing password verification entirely and potentially compromising accounts with 2FA enabled. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.


Published

2025-10-29T19:15:39.067

Last Modified

2025-11-04T13:17:27.277

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-287
    CWE-308

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application zitadel zitadel ≤ 2.53.9 Yes
Application zitadel zitadel ≤ 2.54.10 Yes
Application zitadel zitadel < 2.71.18 Yes
Application zitadel zitadel < 3.4.3 Yes
Application zitadel zitadel < 4.6.0 Yes

References