Unrated severityNVD Advisory· Published Jul 15, 2025· Updated Jul 15, 2025
ZITADEL has broken authN and authZ in session API and resulting session tokens
CVE-2025-53895
Description
ZITADEL is an open source identity management system. Starting in version 2.53.0 and prior to versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14, vulnerability in ZITADEL's session management API allows any authenticated user to update a session if they know its ID, due to a missing permission check. This flaw enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources. Versions prior to 2.53.0 are not affected, as they required the session token for updates. Versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14 fix the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/zitadel/zitadel/releases/tag/v2.70.14mitrex_refsource_MISC
- github.com/zitadel/zitadel/releases/tag/v2.71.13mitrex_refsource_MISC
- github.com/zitadel/zitadel/releases/tag/v3.3.2mitrex_refsource_MISC
- github.com/zitadel/zitadel/releases/tag/v4.0.0-rc.2mitrex_refsource_MISC
- github.com/zitadel/zitadel/security/advisories/GHSA-6c5p-6www-pcmrmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.