Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 30 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Zitadel Zitadel zitadel | |
| Vendors & Products | Zitadel Zitadel zitadel | 
Wed, 29 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18. | |
| Title | Zitadel allows brute-forcing authentication factors | |
| Weaknesses | CWE-307 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-29T18:36:15.390Z
Updated: 2025-10-30T14:53:53.184Z
Reserved: 2025-10-27T15:26:14.127Z
Link: CVE-2025-64102
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-30T14:53:49.934Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-29T19:15:38.927
Modified: 2025-10-30T15:03:13.440
Link: CVE-2025-64102
 Redhat
                        Redhat
                    No data.