Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.
References
Configurations
Configuration 1 (hide)
|
History
04 Nov 2025, 13:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Zitadel
Zitadel zitadel |
|
| References | () https://github.com/zitadel/zitadel/commit/b8db8cdf9cc8ea13f461758aef12457f8b7d972a - Patch | |
| References | () https://github.com/zitadel/zitadel/security/advisories/GHSA-xrw9-r35x-x878 - Vendor Advisory |
29 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-29 19:15
Updated : 2025-11-04 13:18
NVD link : CVE-2025-64102
Mitre link : CVE-2025-64102
CVE.ORG link : CVE-2025-64102
JSON object : View
Products Affected
zitadel
- zitadel
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
