ZITADEL is an open source identity management platform. Prior to versions 4.11.1 and 3.4.7, a vulnerability in Zitadel's self-management capability allowed users to mark their email and phone as verified without going through an actual verification process. The patch in versions 4.11.1 and 3.4.7 resolves the issue by requiring the correct permission in case the verification flag is provided and only allows self-management of the email address and/or phone number itself. If an upgrade is not possible, an action (v2) could be used to prevent setting the verification flag on the own user.
References
| Link | Resource |
|---|---|
| https://github.com/zitadel/zitadel/security/advisories/GHSA-282g-fhmx-xf54 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
05 Mar 2026, 14:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Zitadel
Zitadel zitadel |
|
| Summary |
|
|
| References | () https://github.com/zitadel/zitadel/security/advisories/GHSA-282g-fhmx-xf54 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* |
26 Feb 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 01:16
Updated : 2026-03-05 14:54
NVD link : CVE-2026-27946
Mitre link : CVE-2026-27946
CVE.ORG link : CVE-2026-27946
JSON object : View
Products Affected
zitadel
- zitadel
CWE
CWE-862
Missing Authorization
