Loading HuntDB...

GHSA-7j7j-66cv-m239

GitHub Security Advisory

ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact
ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email.

While ZITADEL already gives administrators the option to define a `Lockout Policy` with a maximum amount of failed password check attempts, there was no such mechanism for (T)OTP checks.

### Patches
2.x versions are fixed on >= [2.50.0](https://github.com/zitadel/zitadel/releases/tag/v2.50.0)

### Workarounds
There is no workaround since a patch is already available.

### References
None

### Questions
If you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected])

### Credits

Thanks to Jack Moran from Layer 9 Information Security, Ethan from zxsecurity and Amit Laish from GE Vernova for finding and reporting the vulnerability.

Affected Packages

Go github.com/zitadel/zitadel
Affected versions: 0 (fixed in 2.50.0)

Related CVEs

Key Information

GHSA ID
GHSA-7j7j-66cv-m239
Published
April 25, 2024 6:31 PM
Last Modified
November 18, 2024 4:26 PM
CVSS Score
7.5 /10
Primary Ecosystem
Go
Primary Package
github.com/zitadel/zitadel
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 29, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.