ZITADEL LDAP Filter Injection Exposes Usernames, Attributes
The National Vulnerability Database has disclosed CVE-2026-44671, a high-severity LDAP Filter Injection vulnerability in ZITADEL, an open-source identity management platform. Versions 2.71.11 up to 3.4.10 and 4.15.0 are affected. The flaw lies in ZITADEL’s LDAP identity provider, which fails to properly escape user-supplied usernames before incorporating them into LDAP search filters during the login process.
This vulnerability, while not a full authentication bypass, allows unauthenticated attackers to perform blind LDAP injection. By manipulating LDAP metacharacters like *, (, and ), attackers can observe differing login responses to systematically enumerate valid usernames. More critically, this can lead to the extraction of sensitive attribute data from connected LDAP directories, effectively turning a login prompt into an information disclosure vector.
Defenders must prioritize patching. The National Vulnerability Database confirms this issue is remediated in ZITADEL versions 3.4.10 and 4.15.0. Any organization leveraging ZITADEL’s LDAP identity provider within the affected version range is at risk of sensitive data exposure.
What This Means For You
- If your organization uses ZITADEL with its LDAP identity provider, immediately verify your version. If you are running 2.71.11 through prior to 3.4.10 or 4.15.0, you are exposed. Patching to 3.4.10 or 4.15.0 is not optional — it's critical to prevent attackers from enumerating user accounts and exfiltrating sensitive LDAP attributes via unauthenticated blind injection.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
ZITADEL LDAP Filter Injection Attempt (CVE-2026-44671)
title: ZITADEL LDAP Filter Injection Attempt (CVE-2026-44671)
id: scw-2026-05-14-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-44671 in ZITADEL by looking for LDAP metacharacters like '(', ')', and '*' within the query parameters of login requests. This indicates a potential blind LDAP injection attack aimed at enumerating usernames or attributes.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44671/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: authentication
detection:
selection:
cs-uri-query|contains:
- '(|'
- '*)'
- '())'
- '(*)'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44671 | LDAP Filter Injection | ZITADEL versions 2.71.11 to before 3.4.10 |
| CVE-2026-44671 | LDAP Filter Injection | ZITADEL versions 4.0.0 to before 4.15.0 |
| CVE-2026-44671 | Information Disclosure | LDAP identity provider implementation fails to properly escape user-provided usernames |
| CVE-2026-44671 | Auth Bypass | Blind LDAP injection during login process to enumerate valid usernames and extract sensitive attribute data |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.