We found results for “”
CVE-2025-64102
Good to know:
Date: October 29, 2025
Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Restriction of Excessive Authentication Attempts
CWE-307Top Fix
Upgrade Version
Upgrade to version github.com/zitadel/zitadel - v2.71.18;github.com/zitadel/zitadel - v3.4.3;github.com/zitadel/zitadel - v4.6.0;github.com/zitadel/zitadel - v1.80.0-v2.20.0.20251029090735-b8db8cdf9cc8
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


