CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-31123: Zitadel Expired JWT Keys Usable for Authorization Grants

8.7 CVSS

Description

Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9.

Classification

CVE ID: CVE-2025-31123

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Problem Types

CWE-324: Use of a Key Past its Expiration Date

Affected Products

Vendor: zitadel

Product: zitadel

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 14.18% (scored less or equal to compared to others)

EPSS Date: 2025-04-29 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-31123
https://github.com/zitadel/zitadel/security/advisories/GHSA-h3q7-347g-qwhf
https://github.com/zitadel/zitadel/commit/315503beabd679f2e6aec0c004f0f9d2f5b53ed3
https://github.com/zitadel/zitadel/releases/tag/v2.63.9
https://github.com/zitadel/zitadel/releases/tag/v2.64.6
https://github.com/zitadel/zitadel/releases/tag/v2.65.7
https://github.com/zitadel/zitadel/releases/tag/v2.66.16
https://github.com/zitadel/zitadel/releases/tag/v2.67.13
https://github.com/zitadel/zitadel/releases/tag/v2.68.9
https://github.com/zitadel/zitadel/releases/tag/v2.69.9
https://github.com/zitadel/zitadel/releases/tag/v2.70.8
https://github.com/zitadel/zitadel/releases/tag/v2.71.6

Timeline