Exploit for CVE-2026-29067

ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1.

Published: 2026-03-07

CVSS: 9.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Download Exploit for CVE-2026-29067 here:

Use Tor Browser to access .onion site.

https://sonitex.com/exploit-499-cve-2025-54001/

https://sonitex.com/exploit-581-cve-2025-55289/

https://sonitex.com/exploit-106-cve-2019-25456/

https://sonitex.com/exploit-128-cve-2026-3025/