An issue was discovered in Zeroheight (SaaS) prior to 2025-06-13. A legacy user creation API pathway allowed accounts to be created without completing the intended email verification step. While unverified accounts could not access product functionality, the behavior bypassed intended verification controls and allowed unintended account creation. This could have enabled spam/fake account creation or resource usage impact. No data exposure or unauthorized access to existing accounts was reported.
References
| Link | Resource |
|---|---|
| https://github.com/Sneden/zeroheight-account-verification-bypass-CVE-2025-65925 | Third Party Advisory |
Configurations
History
13 Jan 2026, 22:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:zeroheight:zeroheight:*:*:*:*:*:*:*:* | |
| References | () https://github.com/Sneden/zeroheight-account-verification-bypass-CVE-2025-65925 - Third Party Advisory | |
| First Time |
Zeroheight
Zeroheight zeroheight |
02 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-287 |
30 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-30 17:15
Updated : 2026-01-13 22:17
NVD link : CVE-2025-65925
Mitre link : CVE-2025-65925
CVE.ORG link : CVE-2025-65925
JSON object : View
Products Affected
zeroheight
- zeroheight
CWE
CWE-287
Improper Authentication
