CVE-2025-53895
Published: 15 July 2025
Summary
CVE-2025-53895 is a high-severity Session Fixation (CWE-384) vulnerability in Zitadel Zitadel. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 29.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly addressing the missing permission check that allows unauthorized session updates.
Requires timely identification, reporting, and correction of flaws like the missing permission check in ZITADEL's session management API.
Employs least privilege to restrict authenticated users from performing unauthorized actions such as updating other users' sessions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing permission check enables unauthorized session updates, directly facilitating web session hijacking and theft/use of session credentials for impersonation.
NVD Description
ZITADEL is an open source identity management system. Starting in version 2.53.0 and prior to versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14, vulnerability in ZITADEL's session management API allows any authenticated user to update a session if they know its ID,…
more
due to a missing permission check. This flaw enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources. Versions prior to `2.53.0` are not affected, as they required the session token for updates. Versions 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14 fix the issue.
Deeper analysisAI
CVE-2025-53895 is a vulnerability in ZITADEL, an open source identity management system, affecting the session management API. The issue arises from a missing permission check, allowing any authenticated user to update another user's session if they know its ID. It impacts versions starting from 2.53.0 up to but not including the fixed releases: 4.0.0-rc.2, 3.3.2, 2.71.13, and 2.70.14. Versions prior to 2.53.0 are unaffected, as they required the session token itself for updates.
Any low-privileged authenticated user (PR:L) on the network (AV:N) can exploit this with low complexity (AC:L) and no user interaction (UI:N). By obtaining a target session ID, the attacker can update the session, hijacking it to impersonate the victim and access sensitive resources. The vulnerability carries a CVSS v3.1 base score of 8.8 (C:H/I:H/A:H), tied to CWE-384 (Session Fixation) and CWE-863 (Incorrect Authorization).
ZITADEL's security advisory (GHSA-6c5p-6www-pcmr) and release notes recommend upgrading to the fixed versions: 4.0.0-rc.2, 3.3.2, 2.71.13, or 2.70.14, which restore proper permission checks in the session management API. No other mitigations are specified in the provided references.
Details
- CWE(s)