CVE-2026-29193 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: March 9, 2026
ZITADEL - Authentication Bypass
Overview
ZITADEL 4.0.0 to 4.12.0 contains an authentication bypass caused by flawed login V2 UI logic, letting users bypass login policies and self-register or sign in with password despite disabled options, exploit requires user interaction.
Severity & Score
Impact
Attackers can bypass login restrictions to self-register or sign in, potentially compromising account security and organizational policies.
Mitigation
Upgrade to version 4.12.1 or later.
Social Media Activity(1 post)
š CVE-2026-29193 - High (8.2) ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password ev... š https://www.thehackerwire.com/vulnerability/CVE-2026-29193/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-29193
- Severity
- High
- CVSS Score
- 8.2
- Type
- broken_authentication
- Status
- unconfirmed
- EPSS
- 3.0%
- Social Posts
- 1
CWE
- CWE-287
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N