A flaw was identified in the OpenSearch REST layer that could allow authorization checks to be bypassed when processing certain malformed HTTP requests. This could permit unauthorized access to restricted API endpoints in environments that rely on REST-layer authorization.
Transport-level authorization is not affected by this issue.
The default OpenSearch distribution is not affected by this issue. REST actions in the default distribution have corresponding transport actions that independently enforce authorization. Custom plugins that register REST actions without a corresponding transport action may be affected, potentially allowing unauthorized read access to those endpoints.
This issue is fixed in OpenSearch 2.19.0. Users should upgrade to 2.19.0 or later.
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-07T00:07:42Z",
"cwe_ids": [
"CWE-863"
],
"severity": "LOW",
"nvd_published_at": null
}