{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T08:12:07.943","vulnerabilities":[{"cve":{"id":"CVE-2025-31123","sourceIdentifier":"security-advisories@github.com","published":"2025-03-31T20:15:15.547","lastModified":"2025-08-26T17:13:31.790","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9."},{"lang":"es","value":"Zitadel es un software de infraestructura de identidad de código abierto. Existía una vulnerabilidad que permitía usar claves caducadas para recuperar tokens. En concreto, ZITADEL no verificaba correctamente la fecha de caducidad de la clave JWT al usarla para concesiones de autorización. Esto permitía a un atacante con una clave caducada obtener tokens de acceso válidos. Esta vulnerabilidad no afecta el uso del perfil JWT para la autenticación de cliente OAuth 2.0 en los endpoints de token e introspección, que rechazan correctamente las claves caducadas. Esta vulnerabilidad se ha corregido en las versiones 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6 y 2.63.9."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":5.8}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-324"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.62.0","versionEndExcluding":"2.63.9","matchCriteriaId":"5EB97D4D-7A24-4739-8A7B-D102BCF0889F"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.64.0","versionEndExcluding":"2.64.6","matchCriteriaId":"D7142F7F-9380-4C7B-A48F-D4A86F5F9759"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.65.0","versionEndExcluding":"2.65.7","matchCriteriaId":"DE6B033C-D29A-4AFE-B836-F1763E7844F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.66.0","versionEndExcluding":"2.66.16","matchCriteriaId":"5DD1E62B-7DDC-474E-A100-5B0569F5B8FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.67.0","versionEndExcluding":"2.67.13","matchCriteriaId":"E0D9F074-8DBB-4FFC-A104-B33B902FDD02"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.68.0","versionEndExcluding":"2.68.9","matchCriteriaId":"8DE6D67C-182B-4F08-B4A8-D24A0FD2B66B"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.69.0","versionEndExcluding":"2.69.9","matchCriteriaId":"A2723F26-27EE-4EA2-845D-93DFA3D2B3F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.70.0","versionEndExcluding":"2.70.8","matchCriteriaId":"FC6090EB-53CF-43AC-AB5B-D51AA2A539C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.71.0","versionEndExcluding":"2.71.6","matchCriteriaId":"3FD8F27A-ED3D-4674-8D57-F348A320A17B"}]}]}],"references":[{"url":"https://github.com/zitadel/zitadel/commit/315503beabd679f2e6aec0c004f0f9d2f5b53ed3","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.63.9","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.64.6","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.65.7","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.66.16","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.67.13","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.68.9","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.69.9","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.70.8","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/releases/tag/v2.71.6","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/zitadel/zitadel/security/advisories/GHSA-h3q7-347g-qwhf","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}