-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from two key flaws: 1) Token issuance allowed non-active users due to a weak state check (isUserStateExists instead of explicit active state check). 2) Token refresh logic didn't properly respond to account status changes (locked/deactivated). The commit fixes these by: a) Changing the user state check to require UserStateActive in addUserToken, and b) Adding explicit handling of deactivation/lock events in the token write model's Reduce method to mark tokens as invalid.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/zitadel/zitadel | go | >= 2.17.0, < 2.17.3 | 2.17.3 |
| github.com/zitadel/zitadel | go | >= 2.0.0, < 2.16.4 | 2.16.4 |
Ongoing coverage of React2Shell