Identity Infrastructure Vulnerability in Zitadel Affecting Token Authorization
CVE-2025-31123
Summary
A vulnerability in Zitadel, the open-source identity infrastructure software, allows attackers to exploit expired JWT keys to retrieve valid access tokens. The issue arises from Zitadel's failure to adequately check the expiration date of JWT keys used in Authorization Grants, potentially granting unauthorized access. Notably, this vulnerability does not impact the correct validation processes for JWT Profile in OAuth 2.0 Client Authentication on Token and Introspection endpoints. A patch has been issued addressing this issue in the latest versions.
Affected Version(s)
zitadel >= 2.62.0, < 2.63.9 < 2.62.0, 2.63.9
zitadel >= 2.64.0-rc.1, < 2.64.6 < 2.64.0-rc.1, 2.64.6
zitadel >= 2.65.0-rc.1, < 2.65.7 < 2.65.0-rc.1, 2.65.7
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved