CVE-2023-22492

RefreshToken invalidation vulnerability

Description

ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI. RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant. When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration). As a workaround, ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements. This issue has been patched in versions 2.17.3 and 2.16.4.

Category

5.9
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.08%
Third-Party Advisory github.com Third-Party Advisory github.com Third-Party Advisory github.com
Affected: zitadel zitadel
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-22492?
CVE-2023-22492 has been scored as a medium severity vulnerability.
How to fix CVE-2023-22492?
To fix CVE-2023-22492, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-22492 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-22492 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-22492?
CVE-2023-22492 affects zitadel zitadel.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.