CVE-2026-29191 - Vulnerability Analysis
CriticalCVSS: 9.3Last Updated: March 9, 2026
ZITADEL - Stored XSS
Overview
ZITADEL 4.0.0 to 4.11.1 contains a stored XSS vulnerability caused by improper input sanitization in the /saml-post login V2 interface, letting attackers perform account takeover via script execution, exploit requires victim interaction.
Severity & Score
Impact
Attackers can execute scripts to hijack user sessions, leading to account takeover.
Mitigation
Update to version 4.12.0 or later.
Social Media Activity(1 post)
Critical 1-Click Account Takeover Vulnerability Patched in ZITADEL IAM Platform ZITADEL patched a critical XSS vulnerability (CVE-2026-29191) that allows unauthenticated attackers to take over user accounts via a single-click malicious link. The flaw can lead to unauthorized password resets. **If you are using ZITADEL, this is important. Plan a very quick update to version 4.12.0 because your users will be hacked, the full exploit instruction is already public. If you cannot patch today, block the /saml-post endpoint at your firewall and ensure MFA is active for all users.** #cybersecurity #infosec #advisory #vulnerability https://beyondmachines.net/event_details/critical-1-click-account-takeover-vulnerability-patched-in-zitadel-iam-platform-1-1-6-i-0/gD2P6Ple2L
View original postRelated Resources
Details
- CVE ID
- CVE-2026-29191
- Severity
- Critical
- CVSS Score
- 9.3
- Type
- stored_xss
- Status
- unconfirmed
- EPSS
- 3.4%
- Social Posts
- 1
CWE
- CWE-79
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N