CVE-2026-32131

high

Description

ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12.2, a vulnerability in Zitadel's Management API has been reported, which allowed authenticated users holding a valid low-privilege token (e.g., project.read, project.grant.read, or project.app.read) to retrieve management-plane information belonging to other organizations by specifying a different tenant’s project_id, grant_id, or app_id. This vulnerability is fixed in 3.4.8 and 4.12.2.

References

https://github.com/zitadel/zitadel/security/advisories/GHSA-wr6r-59xg-4pj2

https://github.com/zitadel/zitadel/releases/tag/v4.12.2

https://github.com/zitadel/zitadel/releases/tag/v3.4.8

Details

Source: Mitre, NVD

Published: 2026-03-11

Updated: 2026-03-11

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 7.7

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Severity: High

EPSS

EPSS: 0.00027