ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12.2, a potential vulnerability exists in Zitadel's passkey registration endpoints. This endpoint allows registering a new passkey using a previously retrieved code. An improper expiration check of the code, could allow an attacker to potentially register their own passkey and gain access to the victim's account. This vulnerability is fixed in 3.4.8 and 4.12.2.
References
| Link | Resource |
|---|---|
| https://github.com/zitadel/zitadel/releases/tag/v3.4.8 | Product |
| https://github.com/zitadel/zitadel/releases/tag/v4.12.2 | Product |
| https://github.com/zitadel/zitadel/security/advisories/GHSA-2x66-r53r-9r86 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Mar 2026, 16:52
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:zitadel:zitadel:*:-:*:*:*:*:*:* cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* |
|
| First Time |
Zitadel
Zitadel zitadel |
|
| Summary |
|
|
| References | () https://github.com/zitadel/zitadel/releases/tag/v3.4.8 - Product | |
| References | () https://github.com/zitadel/zitadel/releases/tag/v4.12.2 - Product | |
| References | () https://github.com/zitadel/zitadel/security/advisories/GHSA-2x66-r53r-9r86 - Vendor Advisory |
11 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 22:16
Updated : 2026-03-16 16:52
NVD link : CVE-2026-32132
Mitre link : CVE-2026-32132
CVE.ORG link : CVE-2026-32132
JSON object : View
Products Affected
zitadel
- zitadel
CWE
CWE-613
Insufficient Session Expiration
