
We found results for “”
CVE-2025-53895
Good to know:

Date: July 15, 2025
ZITADEL is an open source identity management system. Starting in version 2.53.0 and prior to versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14, vulnerability in ZITADEL's session management API allows any authenticated user to update a session if they know its ID, due to a missing permission check. This flaw enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources. Versions prior to "2.53.0" are not affected, as they required the session token for updates. Versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14 fix the issue.
Severity Score
Related Resources (7)
Severity Score
Top Fix

Upgrade Version
Upgrade to version https://github.com/zitadel/zitadel.git - v2.70.14;https://github.com/zitadel/zitadel.git - v2.71.13;https://github.com/zitadel/zitadel.git - v3.3.1;https://github.com/zitadel/zitadel.git - v4.0.0-rc.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |