CVE-2025-64102

Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*

History

04 Nov 2025, 13:18

Type Values Removed Values Added
CPE cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Zitadel
Zitadel zitadel
References () https://github.com/zitadel/zitadel/commit/b8db8cdf9cc8ea13f461758aef12457f8b7d972a - () https://github.com/zitadel/zitadel/commit/b8db8cdf9cc8ea13f461758aef12457f8b7d972a - Patch
References () https://github.com/zitadel/zitadel/security/advisories/GHSA-xrw9-r35x-x878 - () https://github.com/zitadel/zitadel/security/advisories/GHSA-xrw9-r35x-x878 - Vendor Advisory

29 Oct 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-29 19:15

Updated : 2025-11-04 13:18


NVD link : CVE-2025-64102

Mitre link : CVE-2025-64102

CVE.ORG link : CVE-2025-64102


JSON object : View

Products Affected

zitadel

  • zitadel
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts