Cyber Posture

CVE-2026-29191

Critical

Published: 07 March 2026

Published
07 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0001 3.4th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29191 is a critical-severity Cross-site Scripting (CWE-79) vulnerability in Zitadel Zitadel. Its CVSS base score is 9.3 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Filters and encodes outputs from the /saml-post endpoint to prevent execution of injected scripts leading to XSS-based account takeover.

prevent

Validates inputs to the login V2 /saml-post endpoint to reject malicious payloads that could enable XSS exploitation.

prevent

Mandates timely patching of identified flaws, such as upgrading ZITADEL to version 4.12.0 to remediate this XSS vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

XSS in public-facing ZITADEL /saml-post endpoint directly enables T1190 (exploiting public-facing web apps for initial access) and facilitates T1185 (browser session hijacking via injected scripts to steal tokens/credentials for account takeover).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version…

more

4.12.0.

Deeper analysisAI

CVE-2026-29191 is a cross-site scripting (XSS) vulnerability, classified under CWE-79, in the login V2 interface of ZITADEL, an open-source identity management platform. The issue affects versions 4.0.0 through 4.11.1 and resides in the /saml-post endpoint, enabling potential account takeover. It carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N), indicating critical severity due to its network accessibility, low complexity, and high potential impact on confidentiality and integrity.

Attackers require no privileges and can exploit the vulnerability remotely by tricking authenticated users into interacting with malicious content, such as through a crafted SAML POST request delivered via phishing or similar vectors. Successful exploitation expands the scope of impact, allowing attackers to steal session tokens or credentials, resulting in full account takeover and unauthorized access to the victim's identity management resources.

The vulnerability has been patched in ZITADEL version 4.12.0. Administrators are advised to upgrade immediately to mitigate the risk. Additional details are available in the GitHub Security Advisory at https://github.com/zitadel/zitadel/security/advisories/GHSA-pr34-2v5x-6qjq.

Details

CWE(s)

Affected Products

zitadel
zitadel
4.0.0 — 4.12.0

CVEs Like This One

CVE-2026-29192Same product: Zitadel Zitadel
CVE-2025-64103Same product: Zitadel Zitadel
CVE-2026-32130Same product: Zitadel Zitadel
CVE-2025-53895Same product: Zitadel Zitadel
CVE-2026-29067Same product: Zitadel Zitadel
CVE-2026-32132Same product: Zitadel Zitadel
CVE-2025-64717Same product: Zitadel Zitadel
CVE-2026-29193Same product: Zitadel Zitadel
CVE-2026-32131Same product: Zitadel Zitadel
CVE-2025-27507Same product: Zitadel Zitadel

References