ZITADEL

ZITADEL

ZITADEL faced a critical Insecure Direct Object Reference (IDOR) vulnerability (CVE-2025-27507), threatening organizations through account takeover and configuration tampering risks. Authenticated users with low privilege were able to manipulate LDAP authentication settings, resulting in potential full account compromise and backend directory infrastructure exposure. Attackers could exploit vulnerable endpoints to reroute LDAP authentication, extract service credentials, deploy phishing content, and disable MFA controls. The exploitation was hard to detect due to minimal forensic traces, posing significant security challenges. Prompt patching and auditing were required to mitigate risks.

Source: https://cybersecuritynews.com/zitadel-idor-vulnerabilities/

TPRM report: https://scoringcyber.rankiteo.com/company/zitadel

"id": "zit404030625",
"linkid": "zitadel",
"type": "Vulnerability",
"date": "3/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'name': 'ZITADEL', 'type': 'Organization'}],
 'attack_vector': 'Insecure Direct Object Reference (IDOR)',
 'data_breach': {'type_of_data_compromised': ['LDAP authentication settings',
                                              'Service credentials']},
 'description': 'ZITADEL faced a critical Insecure Direct Object Reference '
                '(IDOR) vulnerability (CVE-2025-27507), threatening '
                'organizations through account takeover and configuration '
                'tampering risks. Authenticated users with low privilege were '
                'able to manipulate LDAP authentication settings, resulting in '
                'potential full account compromise and backend directory '
                'infrastructure exposure. Attackers could exploit vulnerable '
                'endpoints to reroute LDAP authentication, extract service '
                'credentials, deploy phishing content, and disable MFA '
                'controls. The exploitation was hard to detect due to minimal '
                'forensic traces, posing significant security challenges. '
                'Prompt patching and auditing were required to mitigate risks.',
 'impact': {'data_compromised': ['LDAP authentication settings',
                                 'Service credentials'],
            'systems_affected': ['LDAP authentication endpoints',
                                 'Backend directory infrastructure']},
 'motivation': ['Account Takeover', 'Configuration Tampering'],
 'response': {'remediation_measures': ['Patching', 'Auditing']},
 'title': 'ZITADEL IDOR Vulnerability (CVE-2025-27507)',
 'type': 'Vulnerability Exploitation',
 'vulnerability_exploited': 'CVE-2025-27507'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.