We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46331

OpenFGA Authorization Bypass



Description

OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA v1.8.10 to v1.3.6 (Helm chart <= openfga-0.2.28, docker <= v.1.8.10) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. This issue has been patched in version 1.8.11.

Reserved 2025-04-22 | Published 2025-04-30 | Updated 2025-05-01 | Assigner GitHub_M


MEDIUM: 5.8CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-284: Improper Access Control

Product status

>=1.3.6, <1.8.11
affected

References

github.com/...penfga/security/advisories/GHSA-w222-m46c-mgh6

github.com/...ommit/244302e7a8b979d66cc1874a3899cdff7d47862f

cve.org (CVE-2025-46331)

nvd.nist.gov (CVE-2025-46331)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46331

Support options

Helpdesk Chat, Email, Knowledgebase