CVE-2026-27840
中文标题:
(暂无数据)
英文标题:
ZITADEL's truncated opaque tokens are still valid
漏洞描述
中文描述:
(暂无数据)
英文描述:
ZITADEL is an open source identity management platform. Starting in version 2.31.0 and prior to versions 3.4.7 and 4.11.0, opaque OIDC access tokens in the v2 format truncated to 80 characters are still considered valid. Zitadel uses a symmetric AES encryption for opaque tokens. The cleartext payload is a concatenation of a couple of identifiers, such as a token ID and user ID. Internally Zitadel has 2 different versions of token payloads. v1 tokens are no longer created, but are still verified as to not invalidate existing session after upgrade. The cleartext payload has a format of `<token_id>:<user_id>`. v2 tokens distinguished further where the `token_id` is of the format `v2_<oidc_session_id>-at_<access_token_id>`. V1 token authZ/N session data is retrieved from the database using the (simple) `token_id` value and `user_id` value. The `user_id` (called `subject` in some parts of our code) was used as being the trusted user ID. V2 token authZ/N session data is retrieved from the database using the `oidc_session_id` and `access_token_id` and in this case the `user_id` from the token is ignored and taken from the session data in the database. By truncating the token to 80 chars, the user_id is now missing from the cleartext of the v2 token. The back-end still accepts this for above reasons. This issue is not considered exploitable, but may look awkward when reproduced. The patch in versions 4.11.0 and 3.4.7 resolves the issue by verifying the `user_id` from the token against the session data from the database. No known workarounds are available.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| zitadel | zitadel | >= 4.0.0, < 4.11.0 | - | - |
cpe:2.3:a:zitadel:zitadel:>=_4.0.0,_<_4.11.0:*:*:*:*:*:*:*
|
| zitadel | zitadel | >= 3.0.0, < 3.4.7 | - | - |
cpe:2.3:a:zitadel:zitadel:>=_3.0.0,_<_3.4.7:*:*:*:*:*:*:*
|
| zitadel | zitadel | >= 2.31.0, <= 2.71.19 | - | - |
cpe:2.3:a:zitadel:zitadel:>=_2.31.0,_<=_2.71.19:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-27840 |
2026-02-26 03:19:54 | 2026-02-25 22:00:01 |
| NVD | nvd_CVE-2026-27840 |
2026-02-27 02:00:05 | 2026-02-26 22:00:03 |
版本与语言
安全公告
变更历史
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']