ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.
Published: 2026-03-07
CVSS: 9.3
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Download Exploit for CVE-2026-29067 here:
Use Tor Browser to access .onion site.
https://sonitex.com/exploit-499-cve-2025-54001/
https://sonitex.com/exploit-581-cve-2025-55289/