CVE-2025-27507

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-27507
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-27507.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-27507
Aliases
Downstream
Related
Published
2025-03-04T16:43:22Z
Modified
2025-10-20T19:33:59Z
Severity
  • 9.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L CVSS Calculator
Summary
IDOR Vulnerabilities in ZITADEL's Admin API that Primarily Impact LDAP Configurations
Details

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do not utilize LDAP for authentication are not at risk from the most severe aspects of this vulnerability. However, upgrading to the patched version to address all identified issues is strongly recommended. This vulnerability is fixed in 2.71.0, 2.70.1, ,2.69.4, 2.68.4, 2.67.8, 2.66.11, 2.65.6, 2.64.5, and 2.63.8.

Database specific
{
    "cwe_ids": [
        "CWE-639"
    ]
}
References

Affected packages

Git / github.com/zitadel/zitadel

Affected ranges

Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events