Authorization Bypass Through User-Controlled Key Affecting github.com/zitadel/zitadel/proto/zitadel package, versions >=2.63.0-rc.1 <2.63.8>=2.64.0-rc.1 <2.64.5>=2.65.0-rc.1 <2.65.6>=2.66.0-rc.1 <2.66.11>=2.67.0-rc.1 <2.67.8>=2.68.0-rc.1 <2.68.4>=2.69.0-rc.1 <2.69.4>=2.70.0-rc.1 <2.70.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMZITADELZITADELPROTOZITADEL-9058626
  • published5 Mar 2025
  • disclosed4 Mar 2025
  • creditAmit Laish

Introduced: 4 Mar 2025

NewCVE-2025-27507  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade github.com/zitadel/zitadel/proto/zitadel to version 2.63.8, 2.64.5, 2.65.6, 2.66.11, 2.67.8, 2.68.4, 2.69.4, 2.70.1 or higher.

Overview

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key within the Admin API, primarily impacting LDAP configurations. Authenticated users lacking specific IAM roles can exploit these vulnerabilities to modify sensitive settings. Notably, unauthorized users could alter LDAP settings, redirecting authentication attempts to malicious servers and potentially exposing LDAP server credentials. Additionally, other endpoints allow unauthorized modifications to instance settings like languages, labels, and templates.

CVSS Base Scores

version 4.0
version 3.1