Home

Description

ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12.2, a vulnerability in Zitadel's Management API has been reported, which allowed authenticated users holding a valid low-privilege token (e.g., project.read, project.grant.read, or project.app.read) to retrieve management-plane information belonging to other organizations by specifying a different tenant’s project_id, grant_id, or app_id. This vulnerability is fixed in 3.4.8 and 4.12.2.

PUBLISHED Reserved 2026-03-10 | Published 2026-03-11 | Updated 2026-03-12 | Assigner GitHub_M




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

CWE-862: Missing Authorization

Product status

>= 4.0.0, < 4.12.2
affected

< 3.4.8
affected

References

github.com/...itadel/security/advisories/GHSA-wr6r-59xg-4pj2

github.com/zitadel/zitadel/releases/tag/v3.4.8

github.com/zitadel/zitadel/releases/tag/v4.12.2

cve.org (CVE-2026-32131)

nvd.nist.gov (CVE-2026-32131)

Download JSON