ZITADEL Allows Unauthorized Access After Organization or Project Deactivation in github.com/zitadel/zitadel.
NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.
(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)
The additional affected modules and versions are: github.com/zitadel/zitadel before v2.54.10, from v2.55.0 before v2.55.8, from v2.56.0 before v2.56.6, from v2.57.0 before v2.57.5, from v2.58.0 before v2.58.5, from v2.59.0 before v2.59.3, from v2.60.0 before v2.60.2, from v2.61.0 before v2.61.1, from v2.62.0 before v2.62.1.
{ "custom_ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.54.10" }, { "introduced": "2.55.0" }, { "fixed": "2.55.8" }, { "introduced": "2.56.0" }, { "fixed": "2.56.6" }, { "introduced": "2.57.0" }, { "fixed": "2.57.5" }, { "introduced": "2.58.0" }, { "fixed": "2.58.5" }, { "introduced": "2.59.0" }, { "fixed": "2.59.3" }, { "introduced": "2.60.0" }, { "fixed": "2.60.2" }, { "introduced": "2.61.0" }, { "fixed": "2.61.1" }, { "introduced": "2.62.0" }, { "fixed": "2.62.1" } ], "type": "ECOSYSTEM" } ] }