CVE-2025-67495
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: GitHub, Inc.

Description
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
zitadel zitadel 4.0.0-rc.1
zitadel zitadel 4.7.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a DOM-Based Cross-Site Scripting (XSS) issue in ZITADEL versions 4.0.0-rc.1 through 4.7.0. It occurs because the /logout endpoint insecurely uses the post_logout_redirect GET parameter to route users, allowing an unauthenticated remote attacker to execute malicious JavaScript code in the browsers of Zitadel users. Exploitation requires multiple user sessions active in the same browser. The vulnerability is fixed in version 4.7.1.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can execute malicious JavaScript code in the browsers of Zitadel users, potentially leading to theft of sensitive information or session manipulation. However, account takeover risk is reduced if Multi-Factor Authentication (MFA) or Passwordless authentication is used. The impact includes high confidentiality and integrity risks but no impact on availability.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Zitadel to version 4.7.1 or later, as this version contains the fix for the DOM-Based XSS vulnerability in the /logout endpoint. Additionally, enabling Multi-Factor Authentication (MFA) or Passwordless authentication can mitigate the risk of account takeover.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart