CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
57.3%
During our internal security assessment, it was discovered that OpenFGA versions v0.2.4 and prior are vulnerable to authorization bypass under certain conditions.
You are affected by this vulnerability if you are using openfga/openfga
version v0.2.4 or prior, and have tuples where the user
field is set to a userset
e.g. folder:test#owner
, and the tuple’s relation is used on the right-hand side of a from
statement.
Upgrade to version 0.2.5.
This update is not backward compatible.
Any tuples where the user
field is set to a userset
, and the tuple’s relation is used on the right-hand side of a from
statement have to be rewritten.