CVE-2025-67495
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zitadel | zitadel | 4.0.0-rc.1 |
| zitadel | zitadel | 4.7.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a DOM-Based Cross-Site Scripting (XSS) issue in ZITADEL versions 4.0.0-rc.1 through 4.7.0. It occurs because the /logout endpoint insecurely uses the post_logout_redirect GET parameter to route users, allowing an unauthenticated remote attacker to execute malicious JavaScript code in the browsers of Zitadel users. Exploitation requires multiple user sessions active in the same browser. The vulnerability is fixed in version 4.7.1.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can execute malicious JavaScript code in the browsers of Zitadel users, potentially leading to theft of sensitive information or session manipulation. However, account takeover risk is reduced if Multi-Factor Authentication (MFA) or Passwordless authentication is used. The impact includes high confidentiality and integrity risks but no impact on availability.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Zitadel to version 4.7.1 or later, as this version contains the fix for the DOM-Based XSS vulnerability in the /logout endpoint. Additionally, enabling Multi-Factor Authentication (MFA) or Passwordless authentication can mitigate the risk of account takeover.