Token Validation Flaw in ZITADEL Identity Management Platform by ZITADEL
CVE-2026-27840
What is CVE-2026-27840?
ZITADEL, an open-source identity management platform, has encountered a token validation flaw in its handling of opaque OIDC access tokens formatted in v2. Earlier versions prior to 3.4.7 and 4.11.0 face limitations where truncated tokens, reduced to 80 characters, are still accepted as valid. This situation arises because the underlying architecture of ZITADEL utilizes a symmetric AES encryption for these tokens, resulting in the omission of crucial user identification data from the token payload. While the vulnerability is not considered exploitative and does not present direct risks, it raises concerns regarding data integrity and trust during authentication processes. Patches in recent versions address these issues by ensuring the user ID is correctly validated against the session data stored in the database.
Affected Version(s)
zitadel >= 4.0.0, < 4.11.0 < 4.0.0, 4.11.0
zitadel >= 3.0.0, < 3.4.7 < 3.0.0, 3.4.7
zitadel >= 2.31.0, <= 2.71.19 <= 2.31.0, 2.71.19
