GHSA-w222-m46c-mgh6

Suggest an improvement
Source
https://github.com/advisories/GHSA-w222-m46c-mgh6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-w222-m46c-mgh6/GHSA-w222-m46c-mgh6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w222-m46c-mgh6
Aliases
Related
Published
2025-04-30T16:43:33Z
Modified
2025-05-15T20:41:48.819420Z
Severity
  • 5.8 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H CVSS Calculator
Summary
OpenFGA Authorization Bypass
Details

Overview OpenFGA v1.8.10 or previous (Helm chart <= openfga-0.2.28, docker <= v.1.8.10) are vulnerable to authorization bypass when certain Check and ListObject calls are executed.

Am I Affected? If you are using OpenFGA v1.8.10 or previous, specifically under the following conditions, you are affected by this authorization bypass vulnerability: - Calling Check API or ListObjects with an authorization model that has tuple cycle. - Check query cache is enabled, and - There are multiple check / list objects requests involving the tuple cycle within the check query TTL

Fix Upgrade to v1.8.11. This upgrade is backwards compatible.

Database specific
{
    "nvd_published_at": "2025-04-30T19:15:55Z",
    "cwe_ids": [
        "CWE-284",
        "CWE-863"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-30T16:43:33Z"
}
References

Affected packages

Go / github.com/openfga/openfga

Package

Name
github.com/openfga/openfga
View open source insights on deps.dev
Purl
pkg:golang/github.com/openfga/openfga

Affected ranges

Type
SEMVER
Events
Introduced
1.3.6
Fixed
1.8.11