Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-49753
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-25 Oct, 2024 | 14:15
Updated At-26 Aug, 2025 | 16:28

Zitadel is open-source identity infrastructure software. Versions prior to 2.64.1, 2.63.6, 2.62.8, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 have a flaw in the URL validation mechanism of Zitadel actions allows bypassing restrictions intended to block requests to localhost (127.0.0.1). The isHostBlocked check, designed to prevent such requests, can be circumvented by creating a DNS record that resolves to 127.0.0.1. This enables actions to send requests to localhost despite the intended security measures. This vulnerability potentially allows unauthorized access to unsecured internal endpoints, which may contain sensitive information or functionalities. Versions 2.64.1, 2.63.6, 2.62.8, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
Primary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CPE Matches

zitadel
zitadel
>>zitadel>>Versions before 2.58.7(exclusive)
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadel
zitadel
>>zitadel>>Versions from 2.59.0(inclusive) to 2.59.5(exclusive)
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadel
zitadel
>>zitadel>>Versions from 2.60.0(inclusive) to 2.60.4(exclusive)
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadel
zitadel
>>zitadel>>Versions from 2.61.0(inclusive) to 2.61.4(exclusive)
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadel
zitadel
>>zitadel>>Versions from 2.62.0(inclusive) to 2.62.8(exclusive)
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadel
zitadel
>>zitadel>>Versions from 2.63.0(inclusive) to 2.63.6(exclusive)
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadel
zitadel
>>zitadel>>Versions from 2.64.0(inclusive) to 2.64.1(exclusive)
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Secondarysecurity-advisories@github.com
NVD-CWE-noinfoPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/zitadel/zitadel/releases/tag/v2.58.7security-advisories@github.com
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.59.5security-advisories@github.com
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.60.4security-advisories@github.com
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.61.4security-advisories@github.com
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.62.8security-advisories@github.com
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.63.6security-advisories@github.com
Release Notes
https://github.com/zitadel/zitadel/releases/tag/v2.64.1security-advisories@github.com
Release Notes
https://github.com/zitadel/zitadel/security/advisories/GHSA-6cf5-w9h3-4rqvsecurity-advisories@github.com
Vendor Advisory
Exploit
Change History
0Changes found

Details not found