Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-64101

ZITADEL Vulnerable to Account Takeover via Malicious Forwarded Header Injection
Back to all
CVE

CVE-2025-64101

ZITADEL Vulnerable to Account Takeover via Malicious Forwarded Header Injection

Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, a potential vulnerability exists in ZITADEL's password reset mechanism. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. If an attacker can manipulate these headers (e.g., via host header injection), they could cause ZITADEL to generate a password reset link pointing to a malicious domain controlled by the attacker. If the user clicks this manipulated link in the email, the secret reset code embedded in the URL can be captured by the attacker. This captured code could then be used to reset the user's password and gain unauthorized access to their account. It's important to note that this specific attack vector is mitigated for accounts that have Multi-Factor Authentication (MFA) or Passwordless authentication enabled. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.1
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
C
H
U
-

Related Resources

No items found.

References

https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64101.json, https://github.com/zitadel/zitadel/commit/72a5c33e6ac302b978d564bd049f9364f5a989b1, https://github.com/zitadel/zitadel/security/advisories/GHSA-mwmh-7px9-4c23, https://nvd.nist.gov/vuln/detail/CVE-2025-64101

Severity

8.1

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8.1
EPSS Probability
0.00117%
EPSS Percentile
0.31216%
Introduced Version
8f0b7ebf028187e84881694bb931cbe33604e308,0f0a55ca18873b85feaca561e6f0b3f081ad4204,5b284f8c9ba65a88fb4d58ac6aa34be429b19e8e
Fix Available
f7309f82953713922421add61d85994d876e8999,921ad56a2163f86b8ff32b9ddaaab64bea3d4fd4,396cdd436cd5e1b217b1f0af4e1a3bd03d1dea5f

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading