Cross-Site Scripting Vulnerability in ZITADEL Identity Management Platform
CVE-2026-29191

9.3CRITICAL

Key Information:

Vendor

Zitadel

Status
Vendor
CVE Published:
7 March 2026

What is CVE-2026-29191?

CVE-2026-29191 is a cross-site scripting (XSS) vulnerability identified in the ZITADEL Identity Management Platform, an open-source solution designed for managing user identities and authentication processes in various applications. Specifically, this vulnerability affects versions 4.0.0 to 4.11.1 of the platform, enabling an attacker to potentially take over user accounts via exploitation of the /saml-post endpoint in the login V2 interface. Given ZITADEL’s role in facilitating secure access to applications, the presence of this vulnerability could adversely affect organizations by allowing unauthorized access to sensitive data, impacting not just the integrity of user accounts but also the overall security posture of the organization.

The flaw could be exploited using malicious scripts that would execute in the context of the user's browser, leading to various risks, such as session hijacking, data theft, or impersonation of legitimate users. Organizations relying on ZITADEL for identity management should take this issue seriously as it can pose significant threats to user trust and regulatory compliance if left unaddressed.

Potential impact of CVE-2026-29191

  1. Account Compromise: Attackers could leverage this vulnerability to gain unauthorized access to user accounts, leading to potential data breaches and unauthorized actions taken in users' names.

  2. Data Theft: As this vulnerability allows for the execution of malicious scripts, attackers may exfiltrate sensitive information, compromising personal data and critical business information, which could have significant legal and financial repercussions for organizations.

  3. Reputation Damage: Exploiting this vulnerability could result in a loss of trust from customers and stakeholders, leading to potential damage to an organization’s reputation, which is often difficult to restore once lost.

Affected Version(s)

zitadel >= 4.0.0, < 4.12.0

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.