Starting from 2.53.6, 2.54.3, and 2.55.0, Zitadel only required multi factor authentication in case the login policy has either enabled requireMFA or requireMFAForLocalUsers. If a user has set up MFA without this requirement, Zitadel would consider single factor auhtenticated sessions as valid as well and not require multiple factors. Bypassing second authentication factors weakens multifactor authentication and enables attackers to bypass the more secure factor. An attacker can target the TOTP code alone, only six digits, bypassing password verification entirely and potentially compromising accounts with 2FA enabled. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 30 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Zitadel Zitadel zitadel | |
| Vendors & Products | Zitadel Zitadel zitadel | 
Wed, 29 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Starting from 2.53.6, 2.54.3, and 2.55.0, Zitadel only required multi factor authentication in case the login policy has either enabled requireMFA or requireMFAForLocalUsers. If a user has set up MFA without this requirement, Zitadel would consider single factor auhtenticated sessions as valid as well and not require multiple factors. Bypassing second authentication factors weakens multifactor authentication and enables attackers to bypass the more secure factor. An attacker can target the TOTP code alone, only six digits, bypassing password verification entirely and potentially compromising accounts with 2FA enabled. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18. | |
| Title | Zitadel Bypass Second Authentication Factor | |
| Weaknesses | CWE-287 CWE-308 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-29T18:43:46.934Z
Updated: 2025-10-30T14:51:19.189Z
Reserved: 2025-10-27T15:26:14.127Z
Link: CVE-2025-64103
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-30T14:51:15.580Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-29T19:15:39.067
Modified: 2025-10-30T15:03:13.440
Link: CVE-2025-64103
 Redhat
                        Redhat
                    No data.