Логотип exploitDog
bind:CVE-2025-25196
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-25196

Количество 3

Количество 3

nvd логотип

CVE-2025-25196

12 месяцев назад

OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA < v1.8.4 (Helm chart < openfga-0.2.22, docker < v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request's user field is a userset that has the same type as the type bound public access tuple's user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-g4v5-6f5p-m38j

12 месяцев назад

OpenFGA Authorization Bypass

EPSS: Низкий
fstec логотип

BDU:2025-02225

12 месяцев назад

Уязвимость интерфейсов Check API и ListObjects системы авторизации OpenFGA, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-25196

OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA < v1.8.4 (Helm chart < openfga-0.2.22, docker < v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request's user field is a userset that has the same type as the type bound public access tuple's user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability.

CVSS3: 9.8
0%
Низкий
12 месяцев назад
github логотип
GHSA-g4v5-6f5p-m38j

OpenFGA Authorization Bypass

0%
Низкий
12 месяцев назад
fstec логотип
BDU:2025-02225

Уязвимость интерфейсов Check API и ListObjects системы авторизации OpenFGA, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 6.5
0%
Низкий
12 месяцев назад

Уязвимостей на страницу