ZITADEL combines the ease of Auth0 and the versatility of Keycloak.**Actions**, introduced in ZITADEL **1.42.0** on the API and **1.56.0** for Console, is a feature, where users with role.`ORG_OWNER` are able to create Javascript Code, which is invoked by the system at certain points during the login. **Actions**, for example, allow creating authorizations (user grants) on newly created users programmatically. Due to a missing authorization check, **Actions** were able to grant authorizations for projects that belong to other organizations inside the same Instance. Granting authorizations via API and Console is not affected by this vulnerability. There is currently no known workaround, users should update.
History

Wed, 23 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-08-31T22:40:10.000Z

Updated: 2025-04-23T17:33:14.632Z

Reserved: 2022-07-15T00:00:00.000Z

Link: CVE-2022-36051

cve-icon Vulnrichment

Updated: 2024-08-03T09:51:59.984Z

cve-icon NVD

Status : Modified

Published: 2022-08-31T23:15:08.097

Modified: 2024-11-21T07:12:16.227

Link: CVE-2022-36051

cve-icon Redhat

No data.