CVE-2025-31124
low-risk
Published 2025-03-31
Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report "Username or Password invalid". While the setting was correctly respected during the login flow, the user's username was normalized leading to a disclosure of the user's existence. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9.
Do I need to act?
-
0.60% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (11)
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.63.9
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.64.6
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.65.7
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.66.16
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.67.13
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.68.9
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.69.9
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.70.8
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.71.6
28
/ 100
low-risk
Severity
21/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal