ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.
History

Sat, 07 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.
Title ZITADEL: Account Takeover Due to Improper Instance Validation in V2 Login
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-07T15:12:26.345Z

Reserved: 2026-03-03T20:51:43.482Z

Link: CVE-2026-29067

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-07T15:15:54.890

Modified: 2026-03-07T15:15:54.890

Link: CVE-2026-29067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.