GHSA-pfrf-9r5f-73f5: ZITADEL Vulnerable to Account Takeover Due to Improper Instance Validation in V2 Login
A potential vulnerability exists in ZITADEL’s password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user.
References
Code Behaviors & Features
Detect and mitigate GHSA-pfrf-9r5f-73f5 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →