CVE-2026-29193

8.2 HIGH

📋 TL;DR

This vulnerability in ZITADEL's login interface allows users to bypass configured security policies and self-register accounts or use password authentication even when these options are disabled for their organization. Organizations using ZITADEL versions 4.0.0 through 4.12.0 are affected, potentially leading to unauthorized account creation and access.

💻 Affected Systems

Products:
  • ZITADEL
Versions: 4.0.0 to 4.12.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects organizations where self-registration or password authentication is disabled in policy settings.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create unauthorized administrator accounts, gain full control of the identity management system, and compromise all managed identities and authentication flows.

🟠

Likely Case

Unauthorized users register accounts in organizations where self-registration is disabled, potentially accessing restricted resources or services.

🟢

If Mitigated

Unauthorized account creation attempts are logged and detected before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to the login interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.12.1

Vendor Advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-25rw-g6ff-fmg8

Restart Required: Yes

Instructions:

1. Backup your ZITADEL instance and configuration. 2. Update to version 4.12.1 using your deployment method (Docker, Kubernetes, etc.). 3. Restart the ZITADEL service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Login V2 UI

all

Temporarily disable the affected login interface until patching is possible.

# Configure ZITADEL to use Login V1 instead of V2
# Modify configuration to set login UI version to v1

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to ZITADEL login endpoints.
  • Enable detailed logging and monitoring for unauthorized registration attempts.

🔍 How to Verify

Check if Vulnerable:

Check ZITADEL version via admin interface or API. If version is between 4.0.0 and 4.12.0 inclusive, the system is vulnerable.

Check Version:

curl -s http://zitadel-instance:8080/api/v1/version | grep version

Verify Fix Applied:

After updating, verify version is 4.12.1 or higher and test that disabled registration/password options are properly enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected account creation events
  • Login attempts using password when password auth is disabled
  • Registration attempts when self-registration is disabled

Network Indicators:

  • Unusual traffic patterns to login endpoints
  • Multiple registration requests from single IP

SIEM Query:

source="zitadel" AND (event="user.created" OR event="user.login") AND status="success" WHERE policy_disabled=true

🔗 References

📤 Share & Export