CVE-2025-57770
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/08/2025
Last modified:
27/08/2025
Description
The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Versions 4.0.0 to 4.0.2, 3.0.0 to 3.3.6, and all versions prior to 2.71.15 are vulnerable to a username enumeration issue in the login interface. The login UI includes a security feature, Ignoring unknown usernames, that is intended to prevent username enumeration by returning a generic response for both valid and invalid usernames. This vulnerability allows an unauthenticated attacker to bypass this protection by submitting arbitrary userIDs to the select account page and distinguishing between valid and invalid accounts based on the system's response. For effective exploitation, an attacker needs to iterate through possible userIDs, but the impact can be limited by implementing rate limiting or similar measures. The issue has been patched in versions 4.0.3, 3.4.0, and 2.71.15.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* | 2.71.15 (excluding) | |
| cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* | 3.0.0 (including) | 3.4.0 (excluding) |
| cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.0.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/zitadel/zitadel/commit/7abe759c95cb360524d88b51744d03cbb6e4dcdb
- https://github.com/zitadel/zitadel/releases/tag/v2.71.15
- https://github.com/zitadel/zitadel/releases/tag/v3.4.0
- https://github.com/zitadel/zitadel/releases/tag/v4.0.3
- https://github.com/zitadel/zitadel/security/advisories/GHSA-g9c3-xh6v-fr86
- https://zitadel.com/docs/self-hosting/manage/production#limits-and-quotas



