NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-49753
Summary

Zitadel is open-source identity infrastructure software. Versions prior to 2.64.1, 2.63.6, 2.62.8, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 have a flaw in the URL validation mechanism of Zitadel actions allows bypassing restrictions intended to block requests to localhost (127.0.0.1). The isHostBlocked check, designed to prevent such requests, can be circumvented by creating a DNS record that resolves to 127.0.0.1. This enables actions to send requests to localhost despite the intended security measures. This vulnerability potentially allows unauthorized access to unsecured internal endpoints, which may contain sensitive information or functionalities. Versions 2.64.1, 2.63.6, 2.62.8, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available.

Publication Date Oct. 25, 2024, 11:15 p.m.
Registration Date Oct. 26, 2024, 5 a.m.
Last Update Oct. 28, 2024, 10:58 p.m.
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
ZITADEL における脆弱性
Title ZITADEL における脆弱性
Summary

ZITADEL には、不特定の脆弱性が存在します。

Possible impacts 情報を取得される、および情報を改ざんされる可能性があります。
Solution

ベンダアドバイザリまたはパッチ情報が公開されています。参考情報を参照して適切な対策を実施してください。

Publication Date Oct. 25, 2024, midnight
Registration Date Aug. 27, 2025, 2:53 p.m.
Last Update Aug. 27, 2025, 2:53 p.m.
Affected System
ZITADEL
ZITADEL 2.58.7 未満
ZITADEL 2.59.0 以上 2.59.5 未満
ZITADEL 2.60.0 以上 2.60.4 未満
ZITADEL 2.61.0 以上 2.61.4 未満
ZITADEL 2.62.0 以上 2.62.8 未満
ZITADEL 2.63.0 以上 2.63.6 未満
ZITADEL 2.64.0 以上 2.64.1 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2025年08月27日]
  掲載
Aug. 27, 2025, 2:53 p.m.