GO-2026-4607

Source
https://pkg.go.dev/vuln/GO-2026-4607
Import Source
https://vuln.go.dev/ID/GO-2026-4607.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2026-4607
Aliases
Published
2026-03-10T18:28:10Z
Modified
2026-03-23T04:53:14.859341Z
Summary
ZITADEL has 1-Click Account Takeover via XSS in /saml-post Endpoint in github.com/zitadel/zitadel
Details

ZITADEL has 1-Click Account Takeover via XSS in /saml-post Endpoint in github.com/zitadel/zitadel.

NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.

(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)

The additional affected modules and versions are: github.com/zitadel/zitadel from v4.0.0 before v4.12.0.

Database specific
{
    "review_status": "UNREVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2026-4607"
}
References

Affected packages

Go / github.com/zitadel/zitadel

Package

Name
github.com/zitadel/zitadel
View open source insights on deps.dev
Purl
pkg:golang/github.com/zitadel/zitadel

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected

Ecosystem specific

{
    "custom_ranges": [
        {
            "events": [
                {
                    "introduced": "4.0.0"
                },
                {
                    "fixed": "4.12.0"
                }
            ],
            "type": "ECOSYSTEM"
        }
    ]
}

Database specific

source
"https://vuln.go.dev/ID/GO-2026-4607.json"