Home

Description

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Versions 4.0.0 to 4.0.2, 3.0.0 to 3.3.6, and all versions prior to 2.71.15 are vulnerable to a username enumeration issue in the login interface. The login UI includes a security feature, Ignoring unknown usernames, that is intended to prevent username enumeration by returning a generic response for both valid and invalid usernames. This vulnerability allows an unauthenticated attacker to bypass this protection by submitting arbitrary userIDs to the select account page and distinguishing between valid and invalid accounts based on the system's response. For effective exploitation, an attacker needs to iterate through possible userIDs, but the impact can be limited by implementing rate limiting or similar measures. The issue has been patched in versions 4.0.3, 3.4.0, and 2.71.15.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-22 | Updated 2025-08-22 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-203: Observable Discrepancy

Product status

< 2.71.15
affected

>= 3.0.0, < 3.4.0
affected

>= 4.0.0, < 4.0.3
affected

References

github.com/...itadel/security/advisories/GHSA-g9c3-xh6v-fr86

github.com/...ommit/7abe759c95cb360524d88b51744d03cbb6e4dcdb

github.com/zitadel/zitadel/releases/tag/v2.71.15

github.com/zitadel/zitadel/releases/tag/v3.4.0

github.com/zitadel/zitadel/releases/tag/v4.0.3

zitadel.com/docs/self-hosting/manage/production

cve.org (CVE-2025-57770)

nvd.nist.gov (CVE-2025-57770)

Download JSON