The vulnerability, CVE-2025-10678, is not within the Go application code of NetBird but rather in the deployment script infrastructure_files/getting-started-with-zitadel.sh. The script failed to remove the default zitadel-admin user created by Zitadel during installation, leaving a default credential in the system.
The patch, commit cf7f6c355f713e83cf171b79e08dac60b316e4fd, addresses this by introducing a new shell function, delete_default_zitadel_admin, and modifying the existing init_zitadel function to call it. This ensures the default administrative user is removed upon setup.
Since the vulnerability lies within a shell script and not the Go source code, no vulnerable functions from the github.com/netbirdio/netbird Go package would appear in a runtime profile. The exploitation of this vulnerability involves logging in with default credentials, which would trigger normal authentication and authorization flows rather than a specific, flawed function in the Netbird application. The identified function, init_zitadel, is a shell function and is considered 'vulnerable' in the sense that it was responsible for the insecure configuration.