VYPR
Critical severityGHSA Advisory· Published Oct 20, 2025· Updated Apr 15, 2026

CVE-2025-10678

CVE-2025-10678

Description

NetBird VPN when installed using vendor's provided script failed to remove or change default password of an admin account created by ZITADEL. This issue affects instances installed using vendor's provided script. This issue may affect instances created with Docker if the default password was not changed nor the user was removed.

This issue has been fixed in version 0.57.0

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/netbirdio/netbirdGo
< 0.57.00.57.0

Affected products

1

Patches

1
cf7f6c355f71

[misc] Remove default zitadel admin user in deployment script (#4482)

https://github.com/netbirdio/netbirdBethuel MmbagaSep 11, 2025via ghsa
1 file changed · +42 0
  • infrastructure_files/getting-started-with-zitadel.sh+42 0 modified
    @@ -328,6 +328,45 @@ delete_auto_service_user() {
       echo "$PARSED_RESPONSE"
     }
     
    +delete_default_zitadel_admin() {
    +  INSTANCE_URL=$1
    +  PAT=$2
    +
    +  # Search for the default zitadel-admin user
    +  RESPONSE=$(
    +    curl -sS -X POST "$INSTANCE_URL/management/v1/users/_search" \
    +      -H "Authorization: Bearer $PAT" \
    +      -H "Content-Type: application/json" \
    +      -d '{
    +        "queries": [
    +          {
    +            "userNameQuery": {
    +              "userName": "zitadel-admin@",
    +              "method": "TEXT_QUERY_METHOD_STARTS_WITH"
    +            }
    +          }
    +        ]
    +      }'
    +  )
    +  
    +  DEFAULT_ADMIN_ID=$(echo "$RESPONSE" | jq -r '.result[0].id // empty')
    +  
    +  if [ -n "$DEFAULT_ADMIN_ID" ] && [ "$DEFAULT_ADMIN_ID" != "null" ]; then
    +    echo "Found default zitadel-admin user with ID: $DEFAULT_ADMIN_ID"
    +
    +    RESPONSE=$(
    +        curl -sS -X DELETE "$INSTANCE_URL/management/v1/users/$DEFAULT_ADMIN_ID" \
    +          -H "Authorization: Bearer $PAT" \
    +          -H "Content-Type: application/json" \
    +    )
    +    PARSED_RESPONSE=$(echo "$RESPONSE" | jq -r '.details.changeDate // "deleted"')
    +    handle_zitadel_request_response "$PARSED_RESPONSE" "delete_default_zitadel_admin" "$RESPONSE"
    +
    +  else
    +    echo "Default zitadel-admin user not found: $RESPONSE"
    +  fi
    +}
    +
     init_zitadel() {
       echo -e "\nInitializing Zitadel with NetBird's applications\n"
       INSTANCE_URL="$NETBIRD_HTTP_PROTOCOL://$NETBIRD_DOMAIN"
    @@ -346,6 +385,9 @@ init_zitadel() {
       echo -n "Waiting for Zitadel to become ready "
       wait_api "$INSTANCE_URL" "$PAT"
     
    +  echo "Deleting default zitadel-admin user..."
    +  delete_default_zitadel_admin "$INSTANCE_URL" "$PAT"
    +
       #  create the zitadel project
       echo "Creating new zitadel project"
       PROJECT_ID=$(create_new_project "$INSTANCE_URL" "$PAT")
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.