ZITADEL Actions V2 Server-Side Request Forgery (SSRF)
Vulnerability ID: CVE-2026-27945
CVSS Score: 2.1
Published: 2026-02-27
A Server-Side Request Forgery (SSRF) vulnerability exists in the ZITADEL identity management platform within the Actions V2 execution engine. The vulnerability allows authenticated administrators with permission to configure Actions to define webhook targets that resolve to local or internal network addresses. This flaw enables high-privileged attackers to probe the internal network structure, access cloud instance metadata services, or interact with local services bound to the loopback interface, bypassing network perimeter controls.
TL;DR
ZITADEL Actions V2 fails to validate webhook target URLs against a deny-list. Authenticated admins can exploit this to send HTTP requests to the loopback interface or internal network services (SSRF). Fixed in version 4.11.1.
⚠️ Exploit Status: POC
Technical Details
- CVE ID: CVE-2026-27945
- CWE ID: CWE-918
- Attack Vector: Network
- CVSS v4.0: 2.1 (Low)
- Privileges Required: High (Admin)
- EPSS Score: 0.03%
Affected Systems
- ZITADEL Identity Management System
-
ZITADEL: >= 2.59.0 < 4.11.1 (Fixed in:
4.11.1)
Code Analysis
Commit: b2532e9
Implementation of denylist check in Actions HTTP module
func (t *Transport) RoundTrip(req *http.Request) (*http.Response, error) { ... if t.denyList.IsBlocked(host) ... }
Commit: bdae824
Commit introducing the vulnerable Actions V2 feature
Unknown
Exploit Details
- Research Context: Advisory describing the theoretical attack via configured Actions
Mitigation Strategies
- Application Patching
- Input Validation (Deny List)
- Network Segmentation
- Egress Filtering
Remediation Steps:
- Upgrade ZITADEL to version 4.11.1 or later.
- Configure
ZITADEL_EXECUTIONS_DENYLISTto include RFC1918 private ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) and cloud metadata IPs (169.254.169.254). - Apply Kubernetes NetworkPolicies to restrict ZITADEL pod egress traffic.
- Audit existing Actions for suspicious target URLs pointing to internal resources.
References
Read the full report for CVE-2026-27945 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)