Skip to content

x/vulndb: potential Go vuln in github.com/zitadel/zitadel/v2: GHSA-93m4-mfpg-c3xf #3721

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
GoVulnBot opened this issue May 28, 2025 · 1 comment
Assignees
Labels

Comments

@GoVulnBot
Copy link

Advisory GHSA-93m4-mfpg-c3xf references a vulnerability in the following Go modules:

Module
github.com/zitadel/zitadel

Description:

Impact

A potential vulnerability exists in ZITADEL's password reset mechanism. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user.

If an attacker can manipulate these headers (e.g., via host header injection), they could cause ZITADEL to generate a password reset link pointing to a malicious domain controlled by the attacker. If the user clicks this manipulated link in the email, the secret reset code embedded in the URL can be capt...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/zitadel/zitadel
      versions:
        - fixed: 0.0.0-20250528081227-c097887bc5f6
      non_go_versions:
        - introduced: TODO (earliest fixed "", vuln range "< 2.38.2-0.20240919104753-94d1eb767837")
        - introduced: TODO (earliest fixed "2.71.11", vuln range ">= 2.71.0, <= 2.71.10")
        - introduced: 2.38.3
        - fixed: 2.70.12
        - introduced: 3.0.0-rc1
        - fixed: 3.2.2
summary: ZITADEL Allows Account Takeover via Malicious X-Forwarded-Proto Header Injection in github.com/zitadel/zitadel
ghsas:
    - GHSA-93m4-mfpg-c3xf
references:
    - advisory: https://github.com/advisories/GHSA-93m4-mfpg-c3xf
    - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-93m4-mfpg-c3xf
    - fix: https://github.com/zitadel/zitadel/commit/c097887bc5f680e12c998580fb56d98a15758f53
notes:
    - fix: 'module merge error: could not merge versions of module github.com/zitadel/zitadel: invalid or non-canonical semver version (found TODO (earliest fixed "", vuln range "< 2.38.2-0.20240919104753-94d1eb767837"))'
    - fix: 'github.com/zitadel/zitadel: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
source:
    id: GHSA-93m4-mfpg-c3xf
    created: 2025-05-28T18:02:04.515775679Z
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/677139 mentions this issue: data/reports: add 5 reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants