{
    "document": {
        "category": "csaf_base",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "en",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this portal to enhance access to its information and vulnerabilities. The use of this information is subject to the following terms and conditions:\n\nThe vulnerabilities disclosed in this portal are gathered by NCSC-NL from a variety of open sources, which the user can retrieve from other platforms. NCSC-NL makes every reasonable effort to ensure that the content of this portal is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or real-time keeping up-to-date. NCSC-NL does not control nor guarantee the accuracy, relevance, timeliness or completeness of information obtained from these external sources. The vulnerabilities disclosed in this portal are intended solely for the convenience of professional parties to take appropriate measures to manage the risks posed to the cybersecurity. No rights can be derived from the information provided therein.\n\nNCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of the vulnerabilities disclosed in this portal. This includes damage resulting from the inaccuracy of incompleteness of the information contained in it.\nThe information on this page is subject to Dutch law. All disputes related to or arising from the use of this portal regarding the disclosure of vulnerabilities will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "National Cyber Security Centre",
            "namespace": "https://www.ncsc.nl/"
        },
        "title": "CVE-2026-29191",
        "tracking": {
            "current_release_date": "2026-03-26T01:23:26.082347Z",
            "generator": {
                "date": "2026-02-17T15:00:00Z",
                "engine": {
                    "name": "V.E.L.M.A",
                    "version": "1.7"
                }
            },
            "id": "CVE-2026-29191",
            "initial_release_date": "2026-03-04T23:54:34.557927Z",
            "revision_history": [
                {
                    "date": "2026-03-04T23:54:34.557927Z",
                    "number": "1",
                    "summary": "CVE created.| Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-03-04T23:54:38.557923Z",
                    "number": "2",
                    "summary": "NCSC Score created."
                },
                {
                    "date": "2026-03-05T00:12:48.532466Z",
                    "number": "3",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (1).| References created (1).| CWES updated (1)."
                },
                {
                    "date": "2026-03-05T00:12:57.795663Z",
                    "number": "4",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-07T15:24:56.851519Z",
                    "number": "5",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (1).| CWES updated (1)."
                },
                {
                    "date": "2026-03-07T15:25:00.748401Z",
                    "number": "6",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-07T15:38:46.888945Z",
                    "number": "7",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (1).| References created (1).| CWES updated (1)."
                },
                {
                    "date": "2026-03-07T15:38:53.489618Z",
                    "number": "8",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-08T14:49:30.246381Z",
                    "number": "9",
                    "summary": "Source created.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-08T14:49:38.990968Z",
                    "number": "10",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-09T17:02:47.885117Z",
                    "number": "11",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-09T17:02:49.216734Z",
                    "number": "12",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-09T18:12:50.446099Z",
                    "number": "13",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-09T21:38:54.265165Z",
                    "number": "14",
                    "summary": "Unknown change."
                },
                {
                    "date": "2026-03-10T18:28:41.927450Z",
                    "number": "15",
                    "summary": "Products connected (1).| Product Identifiers created (1)."
                },
                {
                    "date": "2026-03-10T18:28:49.329744Z",
                    "number": "16",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-20T09:35:22.760889Z",
                    "number": "17",
                    "summary": "Source connected.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-20T09:35:24.469860Z",
                    "number": "18",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T18:15:16.301490Z",
                    "number": "19",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| References created (1)."
                },
                {
                    "date": "2026-03-25T21:43:49.138084Z",
                    "number": "20",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (40).| Products created (1).| References created (3).| CWES updated (1)."
                }
            ],
            "status": "interim",
            "version": "20"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=4.0.0|<4.12.0",
                                "product": {
                                    "name": "vers:unknown/>=4.0.0|<4.12.0",
                                    "product_id": "CSAFPID-5759441",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.0.0",
                                "product": {
                                    "name": "vers:unknown/v4.0.0",
                                    "product_id": "CSAFPID-3726132"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.0.1",
                                "product": {
                                    "name": "vers:unknown/v4.0.1",
                                    "product_id": "CSAFPID-3726137"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.0.2",
                                "product": {
                                    "name": "vers:unknown/v4.0.2",
                                    "product_id": "CSAFPID-3726138"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.0.3",
                                "product": {
                                    "name": "vers:unknown/v4.0.3",
                                    "product_id": "CSAFPID-5155087"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.1.0",
                                "product": {
                                    "name": "vers:unknown/v4.1.0",
                                    "product_id": "CSAFPID-5155088"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.1.1",
                                "product": {
                                    "name": "vers:unknown/v4.1.1",
                                    "product_id": "CSAFPID-5155089"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.1.2",
                                "product": {
                                    "name": "vers:unknown/v4.1.2",
                                    "product_id": "CSAFPID-5155090"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.1.3",
                                "product": {
                                    "name": "vers:unknown/v4.1.3",
                                    "product_id": "CSAFPID-5155091"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.1.4",
                                "product": {
                                    "name": "vers:unknown/v4.1.4",
                                    "product_id": "CSAFPID-5155092"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.10.0",
                                "product": {
                                    "name": "vers:unknown/v4.10.0",
                                    "product_id": "CSAFPID-5729234"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.10.1",
                                "product": {
                                    "name": "vers:unknown/v4.10.1",
                                    "product_id": "CSAFPID-5729235"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.11.0",
                                "product": {
                                    "name": "vers:unknown/v4.11.0",
                                    "product_id": "CSAFPID-5729238"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.11.1",
                                "product": {
                                    "name": "vers:unknown/v4.11.1",
                                    "product_id": "CSAFPID-5910284"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.2.0",
                                "product": {
                                    "name": "vers:unknown/v4.2.0",
                                    "product_id": "CSAFPID-5155093"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.2.1",
                                "product": {
                                    "name": "vers:unknown/v4.2.1",
                                    "product_id": "CSAFPID-5155094"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.2.2",
                                "product": {
                                    "name": "vers:unknown/v4.2.2",
                                    "product_id": "CSAFPID-5155095"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.3.0",
                                "product": {
                                    "name": "vers:unknown/v4.3.0",
                                    "product_id": "CSAFPID-5155096"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.3.1",
                                "product": {
                                    "name": "vers:unknown/v4.3.1",
                                    "product_id": "CSAFPID-5155097"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.3.2",
                                "product": {
                                    "name": "vers:unknown/v4.3.2",
                                    "product_id": "CSAFPID-5155098"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.3.3",
                                "product": {
                                    "name": "vers:unknown/v4.3.3",
                                    "product_id": "CSAFPID-5155099"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.4.0",
                                "product": {
                                    "name": "vers:unknown/v4.4.0",
                                    "product_id": "CSAFPID-5155100"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.5.0",
                                "product": {
                                    "name": "vers:unknown/v4.5.0",
                                    "product_id": "CSAFPID-5155101"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.6.0",
                                "product": {
                                    "name": "vers:unknown/v4.6.0",
                                    "product_id": "CSAFPID-5173267"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.6.1",
                                "product": {
                                    "name": "vers:unknown/v4.6.1",
                                    "product_id": "CSAFPID-5173268"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.6.2",
                                "product": {
                                    "name": "vers:unknown/v4.6.2",
                                    "product_id": "CSAFPID-5173269"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.6.3",
                                "product": {
                                    "name": "vers:unknown/v4.6.3",
                                    "product_id": "CSAFPID-5186931"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.6.4",
                                "product": {
                                    "name": "vers:unknown/v4.6.4",
                                    "product_id": "CSAFPID-5186932"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.6.5",
                                "product": {
                                    "name": "vers:unknown/v4.6.5",
                                    "product_id": "CSAFPID-5186933"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.6.6",
                                "product": {
                                    "name": "vers:unknown/v4.6.6",
                                    "product_id": "CSAFPID-5247563"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.7.0",
                                "product": {
                                    "name": "vers:unknown/v4.7.0",
                                    "product_id": "CSAFPID-5247564"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.7.1",
                                "product": {
                                    "name": "vers:unknown/v4.7.1",
                                    "product_id": "CSAFPID-5255885"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.7.2",
                                "product": {
                                    "name": "vers:unknown/v4.7.2",
                                    "product_id": "CSAFPID-5437292"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.7.3",
                                "product": {
                                    "name": "vers:unknown/v4.7.3",
                                    "product_id": "CSAFPID-5437293"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.7.4",
                                "product": {
                                    "name": "vers:unknown/v4.7.4",
                                    "product_id": "CSAFPID-5437294"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.7.5",
                                "product": {
                                    "name": "vers:unknown/v4.7.5",
                                    "product_id": "CSAFPID-5437295"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.7.6",
                                "product": {
                                    "name": "vers:unknown/v4.7.6",
                                    "product_id": "CSAFPID-5437296"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.8.0",
                                "product": {
                                    "name": "vers:unknown/v4.8.0",
                                    "product_id": "CSAFPID-5437297"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.8.1",
                                "product": {
                                    "name": "vers:unknown/v4.8.1",
                                    "product_id": "CSAFPID-5437298"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.9.0",
                                "product": {
                                    "name": "vers:unknown/v4.9.0",
                                    "product_id": "CSAFPID-5437299"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.9.1",
                                "product": {
                                    "name": "vers:unknown/v4.9.1",
                                    "product_id": "CSAFPID-5729236"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/v4.9.2",
                                "product": {
                                    "name": "vers:unknown/v4.9.2",
                                    "product_id": "CSAFPID-5729237"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Zitadel"
                    }
                ],
                "category": "vendor",
                "name": "Zitadel"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-29191",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "description",
                    "text": "### Summary\n\nA vulnerability was discovered in Zitadel's login V2 interface that allowed a possible account takeover.\n\n### Impact\n\nZitadel exposes an HTTP endpoint named /saml-post. This endpoint is used for handling requests to SAML IdPs and accepts two HTTP GET parameters: url and id. When these parameters are supplied, users’ browsers auto-submit an HTTP POST request to the provided url parameter.\n \nThe endpoint insecurely redirects users using the provided url GET parameter. As a result, by specifying a javascript: scheme, malicious JS code could be executed on Zitadel users’ browsers. \n\nThe endpoint also reflects user-supplied input in the server response, without HTML-encoding it. As a result, it is possible to inject arbitrary HTML code, which again leads to malicious JS code execution in the Zitadel users’ browsers.\n\nAn unauthenticated remote attacker can exploit these XSS vulnerabilities, and thus, execute malicious JavaScript code on behalf of Zitadel users. By doing so, such an attacker could reset the password of their victims, and take over their accounts.\n\nIt's important to note that this specific attack vector is mitigated for accounts that have Multi-Factor Authentication (MFA) or Passwordless authentication enabled.\n\n### Affected Versions\n\nSystems running one of the following versions are affected:\n- **4.x**: `4.0.0` through `4.11.1` (including RC versions)\n \nImportant Note: Although this /saml-post endpoint is used when Zitadel is integrated with a SAML Identity Provider (IdP), the vulnerability in this finding does not require Zitadel to be configured with a SAML IdP. Consequently, Zitadel is vulnerable in its default, out-of-the-box configuration.\n\n### Patches\n\nThe vulnerability has been addressed in the latest releases. The patch reworked the integration of SAML IdPs and the /saml-post endpoint no longer exists. Additionally, the page to change the password, now always requires the user's current password regardless of the state of the authenticated session.\n\n4.x: Upgrade to >= [4.12.0](https://github.com/zitadel/zitadel/releases/tag/v4.12.0)\n\n### Workarounds\n\nThe recommended solution is to upgrade to a patched version. If an upgrade is not possible and no SAML IdP integration is needed, a WAF or reverse proxy rule can be deployed to prevent access to the endpoint.\n\n### Questions\n\nIf there are any questions or comments about this advisory, please email them to [security@zitadel.com](mailto:security@zitadel.com)\n\n### Credits\n\nZITADEL extends thanks once again to Amit Laish from GE Vernova for finding and reporting the vulnerability.",
                    "title": "github - https://github.com/advisories/GHSA-pr34-2v5x-6qjq"
                },
                {
                    "category": "description",
                    "text": "### Summary\n\nA vulnerability was discovered in Zitadel's login V2 interface that allowed a possible account takeover.\n\n### Impact\n\nZitadel exposes an HTTP endpoint named /saml-post. This endpoint is used for handling requests to SAML IdPs and accepts two HTTP GET parameters: url and id. When these parameters are supplied, users’ browsers auto-submit an HTTP POST request to the provided url parameter.\n \nThe endpoint insecurely redirects users using the provided url GET parameter. As a result, by specifying a javascript: scheme, malicious JS code could be executed on Zitadel users’ browsers. \n\nThe endpoint also reflects user-supplied input in the server response, without HTML-encoding it. As a result, it is possible to inject arbitrary HTML code, which again leads to malicious JS code execution in the Zitadel users’ browsers.\n\nAn unauthenticated remote attacker can exploit these XSS vulnerabilities, and thus, execute malicious JavaScript code on behalf of Zitadel users. By doing so, such an attacker could reset the password of their victims, and take over their accounts.\n\nIt's important to note that this specific attack vector is mitigated for accounts that have Multi-Factor Authentication (MFA) or Passwordless authentication enabled.\n\n### Affected Versions\n\nSystems running one of the following versions are affected:\n- **4.x**: `4.0.0` through `4.11.1` (including RC versions)\n \nImportant Note: Although this /saml-post endpoint is used when Zitadel is integrated with a SAML Identity Provider (IdP), the vulnerability in this finding does not require Zitadel to be configured with a SAML IdP. Consequently, Zitadel is vulnerable in its default, out-of-the-box configuration.\n\n### Patches\n\nThe vulnerability has been addressed in the latest releases. The patch reworked the integration of SAML IdPs and the /saml-post endpoint no longer exists. Additionally, the page to change the password, now always requires the user's current password regardless of the state of the authenticated session.\n\n4.x: Upgrade to >= [4.12.0](https://github.com/zitadel/zitadel/releases/tag/v4.12.0)\n\n### Workarounds\n\nThe recommended solution is to upgrade to a patched version. If an upgrade is not possible and no SAML IdP integration is needed, a WAF or reverse proxy rule can be deployed to prevent access to the endpoint.\n\n### Questions\n\nIf there are any questions or comments about this advisory, please email them to [security@zitadel.com](mailto:security@zitadel.com)\n\n### Credits\n\nZITADEL extends thanks once again to Amit Laish from GE Vernova for finding and reporting the vulnerability.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGHSA-pr34-2v5x-6qjq.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version 4.12.0.",
                    "title": "nvd - https://nvd.nist.gov/vuln/detail/CVE-2026-29191"
                },
                {
                    "category": "description",
                    "text": "ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version 4.12.0.",
                    "title": "cveprojectv5 - https://www.cve.org/CVERecord?id=CVE-2026-29191"
                },
                {
                    "category": "description",
                    "text": "ZITADEL has 1-Click Account Takeover via XSS in /saml-post Endpoint in github.com/zitadel/zitadel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/zitadel/zitadel from v4.0.0 before v4.12.0.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4607.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version 4.12.0.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/GIT%2FCVE-2026-29191.json?alt=media"
                },
                {
                    "category": "other",
                    "text": "0.00037",
                    "title": "EPSS"
                },
                {
                    "category": "other",
                    "text": "4.2",
                    "title": "NCSC Score"
                },
                {
                    "category": "other",
                    "text": "Is related to (a version of) an uncommon product, Is related to CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))",
                    "title": "NCSC Score top decreasing factors"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-5759441",
                    "CSAFPID-3726132",
                    "CSAFPID-3726137",
                    "CSAFPID-3726138",
                    "CSAFPID-5155087",
                    "CSAFPID-5155088",
                    "CSAFPID-5155089",
                    "CSAFPID-5155090",
                    "CSAFPID-5155091",
                    "CSAFPID-5155092",
                    "CSAFPID-5155093",
                    "CSAFPID-5155094",
                    "CSAFPID-5155095",
                    "CSAFPID-5155096",
                    "CSAFPID-5155097",
                    "CSAFPID-5155098",
                    "CSAFPID-5155099",
                    "CSAFPID-5155100",
                    "CSAFPID-5155101",
                    "CSAFPID-5173267",
                    "CSAFPID-5173268",
                    "CSAFPID-5173269",
                    "CSAFPID-5186931",
                    "CSAFPID-5186932",
                    "CSAFPID-5186933",
                    "CSAFPID-5247563",
                    "CSAFPID-5247564",
                    "CSAFPID-5255885",
                    "CSAFPID-5437292",
                    "CSAFPID-5437293",
                    "CSAFPID-5437294",
                    "CSAFPID-5437295",
                    "CSAFPID-5437296",
                    "CSAFPID-5437297",
                    "CSAFPID-5437298",
                    "CSAFPID-5437299",
                    "CSAFPID-5729234",
                    "CSAFPID-5729235",
                    "CSAFPID-5729236",
                    "CSAFPID-5729237",
                    "CSAFPID-5729238",
                    "CSAFPID-5910284"
                ]
            },
            "references": [
                {
                    "category": "external",
                    "summary": "Source - github",
                    "url": "https://github.com/advisories/GHSA-pr34-2v5x-6qjq"
                },
                {
                    "category": "external",
                    "summary": "Source raw - github",
                    "url": "https://api.github.com/advisories/GHSA-pr34-2v5x-6qjq"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGHSA-pr34-2v5x-6qjq.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29191"
                },
                {
                    "category": "external",
                    "summary": "Source raw - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-29191"
                },
                {
                    "category": "external",
                    "summary": "Source - cveprojectv5",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-29191"
                },
                {
                    "category": "external",
                    "summary": "Source raw - cveprojectv5",
                    "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/29xxx/CVE-2026-29191.json"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-29191"
                },
                {
                    "category": "external",
                    "summary": "Source raw - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Go%2FGO-2026-4607.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/GIT%2FCVE-2026-29191.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv",
                    "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-pr34-2v5x-6qjq"
                },
                {
                    "category": "external",
                    "summary": "Reference - github",
                    "url": "https://github.com/advisories/GHSA-pr34-2v5x-6qjq"
                },
                {
                    "category": "external",
                    "summary": "Reference - github; osv",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29191"
                },
                {
                    "category": "external",
                    "summary": "Reference - osv",
                    "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/29xxx/CVE-2026-29191.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
                        "baseScore": 9.3,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-3726132",
                        "CSAFPID-3726137",
                        "CSAFPID-3726138",
                        "CSAFPID-5155087",
                        "CSAFPID-5155088",
                        "CSAFPID-5155089",
                        "CSAFPID-5155090",
                        "CSAFPID-5155091",
                        "CSAFPID-5155092",
                        "CSAFPID-5155093",
                        "CSAFPID-5155094",
                        "CSAFPID-5155095",
                        "CSAFPID-5155096",
                        "CSAFPID-5155097",
                        "CSAFPID-5155098",
                        "CSAFPID-5155099",
                        "CSAFPID-5155100",
                        "CSAFPID-5155101",
                        "CSAFPID-5173267",
                        "CSAFPID-5173268",
                        "CSAFPID-5173269",
                        "CSAFPID-5186931",
                        "CSAFPID-5186932",
                        "CSAFPID-5186933",
                        "CSAFPID-5247563",
                        "CSAFPID-5247564",
                        "CSAFPID-5255885",
                        "CSAFPID-5437292",
                        "CSAFPID-5437293",
                        "CSAFPID-5437294",
                        "CSAFPID-5437295",
                        "CSAFPID-5437296",
                        "CSAFPID-5437297",
                        "CSAFPID-5437298",
                        "CSAFPID-5437299",
                        "CSAFPID-5729234",
                        "CSAFPID-5729235",
                        "CSAFPID-5729236",
                        "CSAFPID-5729237",
                        "CSAFPID-5729238",
                        "CSAFPID-5759441",
                        "CSAFPID-5910284"
                    ]
                }
            ],
            "title": "CVE-2026-29191"
        }
    ]
}