Description
OpenFGA is a high-performance and flexible authorization/permission engine. Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs. You are very likely affected if your model involves exclusion (e.g. `a but not b`) or intersection (e.g. `a and b`). This vulnerability is fixed in v1.5.3.
References (2)
Core 2
Core References
Patch, Vendor Advisory x_refsource_confirm
https://github.com/openfga/openfga/security/advisories/GHSA-8cph-m685-6v6r
Scores
CVSS v3
8.1
EPSS
0.0011
EPSS Percentile
29.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-863
Status
published
Products (2)
openfga/openfga
1.5.0 - 1.5.3
openfga/openfga
1.5.0 - 1.5.3Go
Published
Apr 16, 2024
Tracked Since
Feb 18, 2026