Vulnerability in Zitadel's Password Reset Mechanism
CVE-2025-64101

8.1HIGH

Key Information:

Vendor

Zitadel

Status
Vendor
CVE Published:
29 October 2025

What is CVE-2025-64101?

Zitadel, an open-source identity infrastructure software, is affected by a vulnerability in its password reset mechanism prior to version 4.6.0, 3.4.3, and 2.71.18. This flaw involves the use of the Forwarded or X-Forwarded-Host header to generate a password reset confirmation URL. If manipulated by an attacker, the generated link could lead users to a malicious site. Consequently, the secret reset code within the link could be intercepted, potentially allowing the attacker to reset the user's password. Users with Multi-Factor Authentication (MFA) or Passwordless authentication enabled are less vulnerable to this attack. The vulnerability has been addressed in the latest versions of Zitadel.

Affected Version(s)

zitadel >= 4.0.0-rc.1, < 4.6.0 < 4.0.0-rc.1, 4.6.0

zitadel >= 3.0.0-rc.1, < 3.4.3 < 3.0.0-rc.1, 3.4.3

zitadel >= 2.0.0, < 2.71.18 < 2.0.0, 2.71.18

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-64101 : Vulnerability in Zitadel's Password Reset Mechanism