Improper Authentication Affecting github.com/zitadel/zitadel/internal/api/ui/login package, versions >=2.50.0 <2.71.19>=3.0.0-rc.1 <3.4.4>=4.0.0-rc.1 <4.6.6


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.29% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Authentication vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMZITADELZITADELINTERNALAPIUILOGIN-14038271
  • published16 Nov 2025
  • disclosed14 Nov 2025
  • creditJan Kühnlein

Introduced: 14 Nov 2025

NewCVE-2025-64717  (opens in a new tab)
CWE-287  (opens in a new tab)

How to fix?

Upgrade github.com/zitadel/zitadel/internal/api/ui/login to version 2.71.19, 3.4.4, 4.6.6 or higher.

Overview

Affected versions of this package are vulnerable to Improper Authentication via the checkAutoLinking function, when auto-linking was enabled for an IdP, there was no verification to ensure that linking to the identified user was permitted.. An attacker can gain unauthorized access to an existing user account by initiating a login using an external identity provider that has been deactivated or is not permitted for the organization, leading to the attacker's identity being incorrectly linked to the internal account.

Note: This is only exploitable if the targeted account does not have multi-factor authentication enabled and the identity provider is registered at the instance level.

CVSS Base Scores

version 4.0
version 3.1