CVE-2026-29067
Received Received - Intake
Open Redirect in ZITADEL Password Reset URL Allows Phishing

Publication date: 2026-03-07

Last updated on: 2026-03-10

Assigner: GitHub, Inc.

Description
ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-07
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2026-03-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
zitadel zitadel From 4.0.0 (inc) to 4.7.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-29067 is a high-severity vulnerability in ZITADEL versions 4.0.0-rc.1 through 4.7.0 affecting the password reset mechanism in the V2 login UI.'}, {'type': 'paragraph', 'content': 'The vulnerability arises because ZITADEL uses the Forwarded or X-Forwarded-Host HTTP headers from incoming requests to build the URL included in password reset confirmation emails without proper validation.'}, {'type': 'paragraph', 'content': 'An attacker who can manipulate these headers can cause ZITADEL to generate password reset links that point to a malicious domain controlled by the attacker.'}, {'type': 'paragraph', 'content': "If a user clicks on such a manipulated link, the secret reset code embedded in the URL can be intercepted by the attacker, allowing them to reset the user's password and take over the account."}, {'type': 'paragraph', 'content': 'This issue was fixed in ZITADEL version 4.7.1 by validating these headers against trusted domains.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can lead to account takeover by attackers who manipulate HTTP headers to intercept password reset links.'}, {'type': 'paragraph', 'content': "If successful, an attacker can reset a user's password and gain unauthorized access to their account."}, {'type': 'paragraph', 'content': 'The impact includes high confidentiality and integrity risks, as sensitive user accounts can be compromised.'}, {'type': 'paragraph', 'content': 'Multi-Factor Authentication (MFA) or Passwordless authentication can mitigate the risk of account takeover from this vulnerability.'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves manipulation of the Forwarded or X-Forwarded-Host HTTP headers in requests to ZITADEL's password reset mechanism. Detection can focus on monitoring incoming HTTP requests for unusual or unexpected values in these headers."}, {'type': 'paragraph', 'content': 'You can inspect HTTP request headers to identify suspicious or unexpected X-Forwarded-Host or Forwarded headers that might be used to exploit this vulnerability.'}, {'type': 'list_item', 'content': 'Use network traffic capture tools like tcpdump or Wireshark to filter HTTP requests containing X-Forwarded-Host or Forwarded headers.'}, {'type': 'list_item', 'content': "Example tcpdump command to capture HTTP headers: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -i 'X-Forwarded-Host\\|Forwarded'"}, {'type': 'list_item', 'content': 'Check ZITADEL server logs for password reset requests and verify the headers used to generate reset links.'}, {'type': 'list_item', 'content': 'Review email logs or intercepted password reset emails to detect if reset links contain unexpected or malicious domains.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in ZITADEL version 4.7.1 and later. The immediate step is to upgrade your ZITADEL deployment to version 4.7.1 or newer.

As a workaround before upgrading, configure a fronting proxy to remove or override the Forwarded and X-Forwarded-Host headers from incoming requests before they reach ZITADEL.

Ensure that the ZITADEL_API_URL is correctly set and that the HTTP host or X-Forwarded-Host headers are properly passed through reverse proxies.

In multi-instance environments, set the X-ZITADEL-INSTANCE-HOST or X-ZITADEL-FORWARD-HOST headers to trusted values.

Enable Multi-Factor Authentication (MFA) or Passwordless authentication to mitigate the risk of account takeover even if the vulnerability is exploited.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart