ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12.2, a potential vulnerability exists in Zitadel's passkey registration endpoints. This endpoint allows registering a new passkey using a previously retrieved code. An improper expiration check of the code, could allow an attacker to potentially register their own passkey and gain access to the victim's account. This vulnerability is fixed in 3.4.8 and 4.12.2.
References
| Link | Resource |
|---|---|
| https://github.com/zitadel/zitadel/releases/tag/v3.4.8 | Product |
| https://github.com/zitadel/zitadel/releases/tag/v4.12.2 | Product |
| https://github.com/zitadel/zitadel/security/advisories/GHSA-2x66-r53r-9r86 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-11 22:16
Updated : 2026-03-16 16:52
NVD link : CVE-2026-32132
Mitre link : CVE-2026-32132
CVE.ORG link : CVE-2026-32132
JSON object : View
Products Affected
zitadel
- zitadel
CWE
CWE-613
Insufficient Session Expiration
