CVE-2026-29191
Zitadel · Zitadel Identity Management Platform
A critical XSS vulnerability in the Zitadel login V2 interface's /saml-post endpoint could lead to unauthorized account takeovers.
Executive summary
Zitadel is vulnerable to a high-severity Cross-Site Scripting (XSS) attack that could allow attackers to hijack user sessions and take over accounts.
Vulnerability
The flaw is located in the /saml-post endpoint of the Login V2 interface. An attacker can inject malicious scripts into the SAML response, which are then executed in the context of the victim's session, potentially leading to account takeover.
Business impact
As an identity management platform, a compromise of Zitadel has cascading effects across all integrated applications. An account takeover of an administrator could result in total control over user identities and access rights. The CVSS score of 9.3 reflects the critical impact on the organization's authentication infrastructure.
Remediation
Immediate Action: Update Zitadel to version 4.12.0 or higher to patch the vulnerable SAML endpoint.
Proactive Monitoring: Monitor for unusual SAML assertions or suspicious activity on the /saml-post endpoint, particularly involving script tags or unexpected redirects.
Compensating Controls: Implement a strong Content Security Policy (CSP) to mitigate the impact of XSS vulnerabilities by restricting the execution of unauthorized scripts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Apply the 4.12.0 update immediately. Identity providers are high-value targets; ensuring the integrity of the login interface is essential for maintaining the security of the entire enterprise application ecosystem.