Vulnerability Description
ZITADEL is an open source identity management platform. Prior to versions 4.11.1 and 3.4.7, a vulnerability in Zitadel's self-management capability allowed users to mark their email and phone as verified without going through an actual verification process. The patch in versions 4.11.1 and 3.4.7 resolves the issue by requiring the correct permission in case the verification flag is provided and only allows self-management of the email address and/or phone number itself. If an upgrade is not possible, an action (v2) could be used to prevent setting the verification flag on the own user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zitadel | Zitadel | < 3.4.7 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-27946?
CVE-2026-27946 is a vulnerability with a CVSS score of 6.5 (MEDIUM). ZITADEL is an open source identity management platform. Prior to versions 4.11.1 and 3.4.7, a vulnerability in Zitadel's self-management capability allowed users to mark their email and phone as verif...
How severe is CVE-2026-27946?
CVE-2026-27946 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27946?
Check the references section above for vendor advisories and patch information. Affected products include: Zitadel Zitadel.