CVE-2026-33132

MEDIUM

ZITADEL is missing enforcement of organization scopes

Title source: cna
STIX 2.1

Description

ZITADEL is an open source identity management platform. Versions prior to 3.4.9 and 4.0.0 through 4.12.2 allowed users to bypass organization enforcement during authentication. Zitadel allows applications to enforce an organzation context during authentication using scopes (urn:zitadel:iam:org:id:{id} and urn:zitadel:iam:org:domain:primary:{domainname}). If enforced, a user needs to be part of the required organization to sign in. While this was properly enforced for OAuth2/OIDC authorization requests in login V1, corresponding controls were missing for device authorization requests and all login V2 and OIDC API V2 endpoints. This allowed users to bypass the restriction and sign in with users from other organizations. Note that this enforcement allows for an additional check during authentication and applications relying on authorizations / roles assignments are not affected by this bypass. This issue has been patched in versions 3.4.9 and 4.12.3.

Scores

CVSS v3 5.3
EPSS 0.0010
EPSS Percentile 27.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-863
Status published
Products (4)
zitadel/zitadel < 1.80.0-v2.20.0.20260317120401-d90285929ca0
zitadel/zitadel >= 3.0.0-rc.1, < 3.4.9
zitadel/zitadel 4.0.0-rc.1 - 4.12.3Go
zitadel/zitadel >= 4.0.0-rc.1, < 4.12.3
Published Mar 20, 2026
Tracked Since Mar 20, 2026