Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-46815

CVE-2025-46815: Zitadel Auth Bypass Vulnerability

CVE-2025-46815 is an authentication bypass flaw in Zitadel that allows attackers to reuse IdP intents and authenticate as legitimate users. This article covers the technical details, affected versions, and mitigation strategies.

Published: April 22, 2026

CVE-2025-46815 Overview

CVE-2025-46815 is an authentication bypass vulnerability in ZITADEL, an open-source identity infrastructure platform. The vulnerability exists in the Session API's handling of Identity Provider (IdP) intents, which allows developers to manage user sessions and authenticate users through external identity providers. A flaw in the intent validation mechanism permits repeated use of IdP intent tokens, enabling an attacker to hijack authentication sessions and impersonate legitimate users.

Critical Impact

Attackers with access to the application's URI can intercept and reuse IdP intent credentials to authenticate on behalf of legitimate users, potentially gaining unauthorized access to protected resources and the ZITADEL API.

Affected Products

  • ZITADEL versions prior to 3.0.0
  • ZITADEL versions prior to 2.71.9
  • ZITADEL versions prior to 2.70.10
  • ZITADEL 3.0.0 release candidates (3.0.0-rc1, 3.0.0-rc2, 3.0.0-rc3)

Discovery Timeline

  • May 6, 2025 - CVE-2025-46815 published to NVD
  • August 26, 2025 - Last updated in NVD database

Technical Details for CVE-2025-46815

Vulnerability Analysis

The vulnerability stems from insufficient validation of IdP intent tokens within ZITADEL's Session API. When a user authenticates via an external Identity Provider, the flow generates an intent ID and token that are sent to a predefined callback URI. These credentials are designed to be single-use authentication artifacts that prove the user successfully authenticated with the IdP.

However, the vulnerable versions of ZITADEL fail to invalidate these intent credentials after their initial use. This allows an attacker who can intercept or observe the callback URI traffic to capture the intent ID and token, then repeatedly replay them to establish authenticated sessions on behalf of the victim user.

The attack surface is network-based and requires user interaction (such as the legitimate user initiating an IdP authentication flow), combined with the attacker having some form of access to the application's callback URI. While exploitation complexity is elevated due to these prerequisites, successful exploitation results in complete authentication bypass with high impact to confidentiality and integrity.

It's important to note that if Multi-Factor Authentication (MFA) is enabled, the attack is partially mitigated as the attacker would still need to complete additional authentication factors to fully access the ZITADEL API.

Root Cause

The root cause is classified as CWE-294: Authentication Bypass by Capture-Replay. The Session API's IdP intent handling mechanism lacks proper single-use token validation and invalidation. Once an intent is successfully used, the system should immediately invalidate the associated ID and token to prevent reuse. The absence of this invalidation logic creates a replay attack vulnerability where captured authentication artifacts can be reused indefinitely.

Attack Vector

The attack vector is network-based, requiring an attacker to have visibility into the callback URI where IdP intent credentials are delivered. The attack flow involves:

  1. A legitimate user initiates authentication via an external Identity Provider through ZITADEL
  2. Upon successful IdP authentication, ZITADEL generates an intent ID and token
  3. These credentials are sent to the predefined application callback URI
  4. An attacker with access to observe this URI intercepts the intent ID and token
  5. The attacker uses these captured credentials to call the Session API
  6. Due to missing single-use validation, the API accepts the replayed credentials
  7. The attacker successfully authenticates as the victim user

The vulnerability does not grant complete API access if MFA is configured, as additional authentication factors would still be required. Organizations relying solely on IdP-based authentication without MFA enforcement are at highest risk.

Detection Methods for CVE-2025-46815

Indicators of Compromise

  • Multiple successful authentications using identical IdP intent IDs within short time windows
  • Authentication events originating from different IP addresses or user agents for the same intent credentials
  • Anomalous patterns of session creation following IdP authentication flows
  • Unusual timing gaps between IdP authentication completion and subsequent session establishment

Detection Strategies

  • Implement logging of all IdP intent ID usage and flag any instances of reuse
  • Monitor for authentication attempts from IP addresses or geolocations inconsistent with the user's normal behavior
  • Set up alerts for multiple session creations tied to the same user within abnormally short time periods
  • Analyze authentication logs for patterns indicating capture-replay activity

Monitoring Recommendations

  • Enable detailed audit logging for the ZITADEL Session API, particularly around IdP intent authentication flows
  • Deploy network monitoring to detect unauthorized access to callback URIs
  • Implement real-time alerting for authentication anomalies based on behavioral baselines
  • Consider integrating SIEM solutions to correlate authentication events across your identity infrastructure

How to Mitigate CVE-2025-46815

Immediate Actions Required

  • Upgrade ZITADEL to version 3.0.0, 2.71.9, or 2.70.10 depending on your current version branch
  • Enable Multi-Factor Authentication (MFA) for all users as an additional protective layer
  • Review authentication logs for potential signs of past exploitation
  • Ensure callback URIs are secured with HTTPS and proper access controls

Patch Information

ZITADEL has released patched versions that address this vulnerability by implementing proper single-use validation for IdP intent tokens. The fix ensures that once an intent ID and token are used for authentication, they are immediately invalidated and cannot be replayed.

Patched Versions:

  • ZITADEL v3.0.0
  • ZITADEL v2.71.9
  • ZITADEL v2.70.10

For detailed technical information about the fix, refer to the GitHub Security Advisory and the associated commit.

Workarounds

  • No known workarounds are available other than upgrading to a patched version
  • As a temporary risk reduction measure, enforce MFA for all users to prevent complete authentication bypass
  • Restrict network access to callback URIs to trusted sources only
  • Consider temporarily disabling IdP-based authentication if upgrading cannot be performed immediately
bash
# Upgrade ZITADEL using Docker (example)
docker pull ghcr.io/zitadel/zitadel:v3.0.0
# Or for the 2.71.x branch
docker pull ghcr.io/zitadel/zitadel:v2.71.9
# Or for the 2.70.x branch
docker pull ghcr.io/zitadel/zitadel:v2.70.10

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechZitadel

  • SeverityHIGH

  • CVSS Score8.0

  • EPSS Probability0.21%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityNone
  • CWE References
  • CWE-294
  • Technical References
  • GitHub Release v2.70.10

  • GitHub Release v2.71.9

  • GitHub Release v3.0.0
  • Vendor Resources
  • GitHub Commit Change

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-33132: Zitadel Auth Bypass Vulnerability

  • CVE-2026-32132: ZITADEL Auth Bypass Vulnerability

  • CVE-2026-32130: ZITADEL SCIM API Auth Bypass Vulnerability

  • CVE-2026-29067: Zitadel Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English