LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-29191

CVE-2026-29191 - Vulnerability Analysis

CriticalCVSS: 9.3

Last Updated: March 9, 2026

ZITADEL - Stored XSS

Published: March 7, 2026Updated: March 9, 2026Remote Exploitable

Overview

ZITADEL 4.0.0 to 4.11.1 contains a stored XSS vulnerability caused by improper input sanitization in the /saml-post login V2 interface, letting attackers perform account takeover via script execution, exploit requires victim interaction.

Severity & Score

Severity: Critical
CVSS Score: 9.3
EPSS Score: 3.4%(Probability of exploitation in next 30 days)

Impact

Attackers can execute scripts to hijack user sessions, leading to account takeover.

Mitigation

Update to version 4.12.0 or later.

Social Media Activity(1 post)

BeyondMachines :verified:
BeyondMachines :verified:
@beyondmachines1
Mar 10, 2026

Critical 1-Click Account Takeover Vulnerability Patched in ZITADEL IAM Platform ZITADEL patched a critical XSS vulnerability (CVE-2026-29191) that allows unauthenticated attackers to take over user accounts via a single-click malicious link. The flaw can lead to unauthorized password resets. **If you are using ZITADEL, this is important. Plan a very quick update to version 4.12.0 because your users will be hacked, the full exploit instruction is already public. If you cannot patch today, block the /saml-post endpoint at your firewall and ensure MFA is active for all users.** #cybersecurity #infosec #advisory #vulnerability https://beyondmachines.net/event_details/critical-1-click-account-takeover-vulnerability-patched-in-zitadel-iam-platform-1-1-6-i-0/gD2P6Ple2L

View original post

Details

CVE ID
CVE-2026-29191
Severity
Critical
CVSS Score
9.3
Type
stored_xss
Status
unconfirmed
EPSS
3.4%
Social Posts
1

CWE

  • CWE-79

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS Score

3.4%Probability of exploitation in the next 30 days