First published: Wed Apr 30 2025(Updated: )
OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA v1.8.10 to v1.3.6 (Helm chart <= openfga-0.2.28, docker <= v.1.8.10) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. This issue has been patched in version 1.8.11.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/openfga/openfga | >=1.3.6<1.8.11 | 1.8.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46331 has a high severity due to potential authorization bypass vulnerabilities.
To fix CVE-2025-46331, upgrade OpenFGA to version 1.8.11 or later.
CVE-2025-46331 affects OpenFGA versions 1.8.10 and earlier.
CVE-2025-46331 can allow unauthorized access through specific Check and ListObject calls.
Yes, the affected package is github.com/openfga/openfga, specifically versions up to 1.8.10.