
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical vulnerability (GHSA-93m4-mfpg-c3xf/CVE-2025-48936) was discovered in ZITADEL's password reset mechanism affecting versions <3.2.2, <2.70.12, and 2.71.0-2.71.10. The vulnerability was disclosed on May 28, 2025, and involves the manipulation of Forwarded or X-Forwarded-Host headers in password reset requests (GitHub Advisory).
The vulnerability exists in how ZITADEL processes the Forwarded or X-Forwarded-Proto header from incoming requests to construct password reset confirmation URLs. The issue has been assigned a CVSS score of 8.1 (High), with attack vector: Network, attack complexity: Low, privileges required: None, user interaction: Required, scope: Unchanged, confidentiality: High, and integrity: High (GitHub Advisory, NVD).
If successfully exploited, an attacker can manipulate the password reset confirmation link to point to a malicious domain. When a user clicks this manipulated link, the secret reset code can be captured by the attacker, allowing them to reset the user's password and gain unauthorized access to their account. However, accounts with Multi-Factor Authentication (MFA) or Passwordless authentication enabled are protected from this attack vector (GitHub Advisory).
The vulnerability has been patched in versions 3.2.2, 2.70.12, and 2.71.11. The patches ensure proper validation of headers and prevent downgrading from HTTPS to HTTP. For users unable to update immediately, a workaround involves configuring a ZITADEL fronting proxy to delete all Forwarded and X-Forwarded-Host header values before sending requests to ZITADEL self-hosted environments (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”