Skip to main content

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CVE-2025-67495

Severity Medium
Score 6.1/10

Summary

ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0, 1.83.4 through 1.87.5 are vulnerable to DOM-Based Cross-Site Scripting (XSS) through the Zitadel V2 logout endpoint. The "/logout" endpoint insecurely routes to a value that is supplied in the "post_logout_redirect" GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.

  • LOW
  • NETWORK
  • LOW
  • CHANGED
  • REQUIRED
  • NONE
  • LOW
  • NONE

CWE-79 - Cross Site Scripting

Cross-Site Scripting, commonly referred to as XSS, is the most dominant class of vulnerabilities. It allows an attacker to inject malicious code into a pregnable web application and victimize its users. The exploitation of such a weakness can cause severe issues such as account takeover, and sensitive data exfiltration. Because of the prevalence of XSS vulnerabilities and their high rate of exploitation, it has remained in the OWASP top 10 vulnerabilities for years.

Advisory Timeline

  • Published