Skip to content

x/vulndb: potential Go vuln in github.com/openfga/openfga: CVE-2025-48371 #3707

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
GoVulnBot opened this issue May 23, 2025 · 0 comments

Comments

@GoVulnBot
Copy link

Advisory CVE-2025-48371 references a vulnerability in the following Go modules:

Module
github.com/openfga/openfga

Description:
OpenFGA is an authorization/permission engine. OpenFGA versions 1.8.0 through 1.8.12 (corresponding to Helm chart openfga-0.2.16 through openfga-0.2.30 and docker 1.8.0 through 1.8.12) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users are affected under four specific conditions: First, calling Check API or ListObjects with an authorization model that has a relationship directly assignable by both type bound public access and userset; second, there are check or list object queries with contextual tuples for the relationship that can be directly a...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/openfga/openfga
      vulnerable_at: 1.8.13
summary: CVE-2025-48371 in github.com/openfga/openfga
cves:
    - CVE-2025-48371
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-48371
    - fix: https://github.com/openfga/openfga/commit/e5960d4eba92b723de8ff3a5346a07f50c1379ca
    - web: https://github.com/openfga/openfga/security/advisories/GHSA-c72g-53hw-82q7
source:
    id: CVE-2025-48371
    created: 2025-05-23T00:01:26.762529158Z
review_status: UNREVIEWED

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants