Home

Description

Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.

PUBLISHED Reserved 2025-10-27 | Published 2025-10-29 | Updated 2025-10-30 | Assigner GitHub_M




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-307: Improper Restriction of Excessive Authentication Attempts

Product status

>= 4.0.0-rc.1, < 4.6.0
affected

>= 3.0.0-rc.1, < 3.4.3
affected

>= 2.0.0, < 2.71.18
affected

References

github.com/...itadel/security/advisories/GHSA-xrw9-r35x-x878

github.com/...ommit/b8db8cdf9cc8ea13f461758aef12457f8b7d972a

cve.org (CVE-2025-64102)

nvd.nist.gov (CVE-2025-64102)

Download JSON