CVE-2023-22492

MEDIUM

Zitadel < 2.16.4 - Insufficient Session Expiration

Title source: rule
STIX 2.1

Description

ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI. RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant. When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration). As a workaround, ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements. This issue has been patched in versions 2.17.3 and 2.16.4.

References (3)

Core 3

Scores

CVSS v3 5.9
EPSS 0.0028
EPSS Percentile 51.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-613
Status published
Products (2)
zitadel/zitadel 2.0.0 - 2.16.4
zitadel/zitadel 2.17.0 - 2.17.3Go
Published Jan 11, 2023
Tracked Since Feb 18, 2026