User Enumeration Vulnerability in Zitadel Identity Infrastructure Software
CVE-2025-31124

5.3MEDIUM

Key Information:

Vendor
Zitadel
Status
Vendor
CVE Published:
31 March 2025

Summary

Zitadel, an open-source identity infrastructure solution, is affected by a vulnerability that allows for user enumeration. When administrators enable the 'Ignoring unknown usernames' setting to mitigate attacks aiming at username guessing, the system still normalizes usernames. This leads to unintentional disclosure of a user's existence by allowing attackers to infer valid usernames based on the login responses. Instead of properly denying existence as intended, legitimate user prompts are shown even when credentials do not exist, indicating a flaw in the user verification process. The issue has been addressed in multiple updated versions of the software.

Affected Version(s)

zitadel >= 2.62.0, < 2.63.9 < 2.62.0, 2.63.9

zitadel >= 2.64.0-rc.1, < 2.64.6 < 2.64.0-rc.1, 2.64.6

zitadel >= 2.65.0-rc.1, < 2.65.7 < 2.65.0-rc.1, 2.65.7

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-31124 : User Enumeration Vulnerability in Zitadel Identity Infrastructure Software | SecurityVulnerability.io