Summarize with:

Share
ZITADEL disclosed CVE-2026-29191 in early March 2026, warning that versions 4.0.0 through 4.11.1 are vulnerable to a one-click cross-site scripting issue in the /saml-post endpoint that can lead to account takeover. According to the vendor advisory, an unauthenticated attacker can trick a victim into loading malicious JavaScript in the context of the ZITADEL login flow, then abuse that access to reset the victim’s password and seize the account.
For defenders, the real risk is not just one user session. Because ZITADEL sits in the Identity and Access Management layer, compromise of privileged or administrator identities can cascade into broader tenant, application, and operational impact. The confirmed fix is to upgrade to 4.12.0 or later and review whether exposed instances can still reach the vulnerable flow.
ZITADEL’s GitHub security advisory says the vulnerable login V2 implementation exposed a /saml-post endpoint that accepted url and id parameters and automatically submitted a POST request to the supplied destination.
The issue had two dangerous properties:
/saml-post endpoint no longer exists.Some headlines describe this as a route to “entire system takeover.” That wording is more dramatic than the confirmed advisory, which explicitly describes account takeover. Still, that distinction matters less in practice when the affected product is the identity plane.
If an attacker takes over:
then the blast radius can extend far beyond one user. In identity infrastructure, Access Control failures often become platform-wide trust failures.
Confirmed affected versions:
Important detail from the vendor: although /saml-post is associated with SAML IdP handling, the vulnerability does not require a SAML IdP integration to be configured. ZITADEL says default out-of-the-box deployments can still be exposed.
That means the likely at-risk population includes:
Accounts protected by Multi-Factor Authentication or passwordless flows are harder to take over through this specific path, and ZITADEL explicitly calls MFA/passwordless out as mitigating this attack vector.
The advisory describes a chain that is straightforward but dangerous:
/saml-post.url value, including the possibility of a javascript: scheme.A single interaction is enough because the vulnerable page performs the unsafe work after the victim loads it. There is no need for prior authentication, malware delivery, or a chained server-side exploit. In identity-centric products, that makes this kind of browser-side bug especially dangerous.
If you operate ZITADEL, treat this as both a patching and a hunting exercise.
/saml-post is still reachable externally/saml-postLook for:
/saml-post with atypical url= parameterssplindex=proxy OR index=web ("/saml-post" OR "%2Fsaml-post") | rex field=url "url=(?<target_url>[^&\s]+)" | search target_url="javascript:*" OR url="*<*" OR url="*%3C*" | stats count values(target_url) values(src_ip) by host, user_agent
Example hunting pattern only. Adjust fields and decoding logic to your telemetry model.
/saml-post at the reverse proxy or Firewall layer when SAML IdP handling is not requiredThis case is a useful reminder that not all high-impact identity flaws are deep backend bugs. Sometimes a seemingly simple client-side or UI-path issue creates the shortest route to meaningful compromise.
Three points stand out:
It is a ZITADEL Login V2 vulnerability that allows one-click XSS in the /saml-post endpoint and can lead to account takeover.
ZITADEL says versions 4.0.0 through 4.11.1, including release candidates, are affected.
No. The advisory explicitly says the vulnerable behavior can exist in default deployments even without SAML IdP configuration.
The vendor says the issue is patched in 4.12.0.
Yes. ZITADEL says this specific attack path is mitigated for accounts protected by MFA or passwordless authentication.
Not automatically, but organizations running affected versions should urgently check for unusual password reset activity, privileged account changes, and suspicious sign-ins tied to recovery flows.
Published: 2026-03-11 Author: Invaders Cybersecurity Classification: Public / TLP:CLEAR Reading Time: 7 minutes
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
Threat Hunting & IntelTCLBANKER turns WhatsApp and Outlook into trusted malware delivery channels The most important detail in Elastic's new TCLBANKER research is not just that a Bra...
Threat Hunting & IntelDAEMON Tools supply-chain attack turns trusted installers into a malware delivery path The most important part of the DAEMON Tools incident is not that malware...
Threat Hunting & IntelCVE-2026-41940 turns exposed cPanel and WHM servers into control-plane takeover targets CVE-2026-41940 is a critical authentication bypass in cPanel and WHM, an...