Skip to content

Commit 4b4110c

Browse files
1 parent e9152ea commit 4b4110c

File tree

2 files changed

+166
-0
lines changed

2 files changed

+166
-0
lines changed
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-f4cf-9rvr-2rcx",
4+
"modified": "2025-12-10T18:20:01Z",
5+
"published": "2025-12-10T18:20:01Z",
6+
"aliases": [],
7+
"summary": "Zitadel Discloses the Total Number of Instance Users",
8+
"details": "### Summary\n\nZitadel's User Service discloses the total number of instance users to unauthorized users.\n\n### Impact\n\nThe ZITADEL User Service exposes the total number of users within an instance to any authenticated user, regardless of their specific permissions. While this does not leak individual user data or PII, disclosing the total user count via the `totalResult` field constitutes an information disclosure vulnerability that may be sensitive in certain contexts.\n\n### Affected Versions\n\nSystems running one of the following version are affected:\n\n- **4.x**: `4.0.0-rc.1` through `4.7.1`\n- **3.x**: `3.0.0-rc.1` through `3.4.4`\n- **2.x**: `2.44.0` through `2.71.19`\n\n### Patches\n\nThe vulnerability has been addressed in the latest release. The patch resolves the issue and returns the `totalResult` value corresponding to the number of instance users for whom the querying user has read permission.\n\n- 4.x: Upgrade to >=[4.7.2](https://github.com/zitadel/zitadel/releases/tag/v4.7.2)\n- 3.x: Update to >=[3.4.5](https://github.com/zitadel/zitadel/releases/tag/v3.4.5)\n- 2.x: Update to >=[3.4.5](https://github.com/zitadel/zitadel/releases/tag/v3.4.5) (or checkout the workarounds section)\n\n### Workarounds\n\nThe recommended solution is to update Zitadel to a patched version.\n\nIf a version upgrade is not possible, you can enable the `permissionCheckV2` feature on your instance.\n\n### Questions\n\nIf you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected])\n\n### Credits\n\nThis vulnerability was found by [zentrust partners GmbH](https://zentrust.partners) during a scheduled penetration test. Thank you to the analysts Martin Tschirsich, Joud Zakharia, Christopher Baumann.\nThe full report will be made public after the complete review.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "github.com/zitadel/zitadel"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "4.0.0-rc.1"
27+
},
28+
{
29+
"fixed": "4.7.2"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 4.7.1"
36+
}
37+
},
38+
{
39+
"package": {
40+
"ecosystem": "Go",
41+
"name": "github.com/zitadel/zitadel"
42+
},
43+
"ranges": [
44+
{
45+
"type": "ECOSYSTEM",
46+
"events": [
47+
{
48+
"introduced": "2.44.0"
49+
},
50+
{
51+
"fixed": "3.4.5"
52+
}
53+
]
54+
}
55+
],
56+
"database_specific": {
57+
"last_known_affected_version_range": "<= 3.4.4"
58+
}
59+
},
60+
{
61+
"package": {
62+
"ecosystem": "Go",
63+
"name": "github.com/zitadel/zitadel"
64+
},
65+
"ranges": [
66+
{
67+
"type": "ECOSYSTEM",
68+
"events": [
69+
{
70+
"introduced": "0"
71+
},
72+
{
73+
"fixed": "1.80.0-v2.20.0.20251210121356-826039c6208f"
74+
}
75+
]
76+
}
77+
]
78+
}
79+
],
80+
"references": [
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-f4cf-9rvr-2rcx"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://github.com/zitadel/zitadel/commit/826039c6208fe71df57b3a94c982b5ac5b0af12c"
88+
},
89+
{
90+
"type": "PACKAGE",
91+
"url": "https://github.com/zitadel/zitadel"
92+
}
93+
],
94+
"database_specific": {
95+
"cwe_ids": [
96+
"CWE-497"
97+
],
98+
"severity": "MODERATE",
99+
"github_reviewed": true,
100+
"github_reviewed_at": "2025-12-10T18:20:01Z",
101+
"nvd_published_at": null
102+
}
103+
}
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-x93p-w2ch-fg67",
4+
"modified": "2025-12-10T18:20:55Z",
5+
"published": "2025-12-10T18:20:55Z",
6+
"aliases": [],
7+
"summary": "Ibexa User Bundle is missing password change validation",
8+
"details": "### Impact\nThe vulnerability is in the password change dialog in the back office. During the transition from v4 to v5 a mistake was made in the validation code which caused the validation of the previous password to not run as expected. This made it possible for a logged in user to change password in the back office without knowing the previous password. For example if someone logs in, leaves their workstation unlocked, and another person uses the same machine.\n\n### Credit\nThe issue was reported to us by Code-Rhapsodie. We thank them for their responsible disclosure!\nhttps://www.code-rhapsodie.fr/\n\n### Patches\n- See \"Patched versions\".\n- https://github.com/ibexa/user/commit/9d485bf385e6401c9f7ee80287d8ccd00f73dcf4\n\n### Workarounds\nNone.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Packagist",
19+
"name": "ibexa/user"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "5.0.0-beta1"
27+
},
28+
{
29+
"fixed": "5.0.4"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/ibexa/user/security/advisories/GHSA-x93p-w2ch-fg67"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/ibexa/user/commit/9d485bf385e6401c9f7ee80287d8ccd00f73dcf4"
44+
},
45+
{
46+
"type": "WEB",
47+
"url": "https://developers.ibexa.co/security-advisories/ibexa-sa-2025-005-password-change-and-xss-vulnerabilities-in-back-office"
48+
},
49+
{
50+
"type": "PACKAGE",
51+
"url": "https://github.com/ibexa/user"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-620"
57+
],
58+
"severity": "CRITICAL",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2025-12-10T18:20:55Z",
61+
"nvd_published_at": null
62+
}
63+
}

0 commit comments

Comments
 (0)