CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-53895: ZITADEL has broken authN and authZ in session API and resulting session tokens

7.7 CVSS

Description

ZITADEL is an open source identity management system. Starting in version 2.53.0 and prior to versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14, vulnerability in ZITADEL's session management API allows any authenticated user to update a session if they know its ID, due to a missing permission check. This flaw enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources. Versions prior to `2.53.0` are not affected, as they required the session token for updates. Versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14 fix the issue.

Classification

CVE ID: CVE-2025-53895

CVSS Base Severity: HIGH

CVSS Base Score: 7.7

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem Types

CWE-863: Incorrect Authorization CWE-384: Session Fixation

Affected Products

Vendor: zitadel

Product: zitadel

References

https://nvd.nist.gov/vuln/detail/CVE-2025-53895
https://github.com/zitadel/zitadel/security/advisories/GHSA-6c5p-6www-pcmr
https://github.com/zitadel/zitadel/releases/tag/v2.70.14
https://github.com/zitadel/zitadel/releases/tag/v2.71.13
https://github.com/zitadel/zitadel/releases/tag/v3.3.2
https://github.com/zitadel/zitadel/releases/tag/v4.0.0-rc.2

Timeline