Vulnerability DatabaseGHSA-93m4-mfpg-c3xf

GHSA-93m4-mfpg-c3xf
vulnerability analysis and mitigation

Overview

A critical vulnerability (GHSA-93m4-mfpg-c3xf/CVE-2025-48936) was discovered in ZITADEL's password reset mechanism affecting versions <3.2.2, <2.70.12, and 2.71.0-2.71.10. The vulnerability was disclosed on May 28, 2025, and involves the manipulation of Forwarded or X-Forwarded-Host headers in password reset requests (GitHub Advisory).

Technical details

The vulnerability exists in how ZITADEL processes the Forwarded or X-Forwarded-Proto header from incoming requests to construct password reset confirmation URLs. The issue has been assigned a CVSS score of 8.1 (High), with attack vector: Network, attack complexity: Low, privileges required: None, user interaction: Required, scope: Unchanged, confidentiality: High, and integrity: High (GitHub Advisory, NVD).

Impact

If successfully exploited, an attacker can manipulate the password reset confirmation link to point to a malicious domain. When a user clicks this manipulated link, the secret reset code can be captured by the attacker, allowing them to reset the user's password and gain unauthorized access to their account. However, accounts with Multi-Factor Authentication (MFA) or Passwordless authentication enabled are protected from this attack vector (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 3.2.2, 2.70.12, and 2.71.11. The patches ensure proper validation of headers and prevent downgrading from HTTPS to HTTP. For users unable to update immediately, a workaround involves configuring a ZITADEL fronting proxy to delete all Forwarded and X-Forwarded-Host header values before sending requests to ZITADEL self-hosted environments (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management