CVE-2025-57770
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-08-27
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zitadel | zitadel | to 2.71.15 (exc) |
| zitadel | zitadel | From 3.0.0 (inc) to 3.4.0 (exc) |
| zitadel | zitadel | From 4.0.0 (inc) to 4.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-203 | The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a username enumeration issue in the Zitadel login interface. Although Zitadel has a security feature that returns generic responses to prevent attackers from distinguishing valid usernames, an unauthenticated attacker can bypass this by submitting arbitrary userIDs to the select account page. By analyzing the system's responses, the attacker can determine which usernames are valid. Exploitation requires iterating through possible userIDs, and the impact can be limited by rate limiting or similar measures.
How can this vulnerability impact me? :
The vulnerability allows an attacker to discover valid usernames in the system without authentication. This can facilitate further attacks such as targeted phishing, password guessing, or social engineering. However, the impact is limited to information disclosure of valid usernames and does not directly affect data integrity or availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Zitadel to a patched version: 4.0.3, 3.4.0, or 2.71.15 or later. Additionally, implementing rate limiting or similar measures on the login interface can help limit the impact of username enumeration attempts.