LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-29193

CVE-2026-29193 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: March 9, 2026

ZITADEL - Authentication Bypass

Published: March 7, 2026Updated: March 9, 2026Remote Exploitable

Overview

ZITADEL 4.0.0 to 4.12.0 contains an authentication bypass caused by flawed login V2 UI logic, letting users bypass login policies and self-register or sign in with password despite disabled options, exploit requires user interaction.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 3.0%(Probability of exploitation in next 30 days)

Impact

Attackers can bypass login restrictions to self-register or sign in, potentially compromising account security and organizational policies.

Mitigation

Upgrade to version 4.12.1 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 7, 2026

🟠 CVE-2026-29193 - High (8.2) ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password ev... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-29193/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-29193
Severity
High
CVSS Score
8.2
Type
broken_authentication
Status
unconfirmed
EPSS
3.0%
Social Posts
1

CWE

  • CWE-287

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

EPSS Score

3.0%Probability of exploitation in the next 30 days