When frontend.enableExecuteMultiOperation is enabled, the server can apply namespace-scoped validation and feature gates for the embedded StartWorkflowExecutionRequest using its Namespace field rather than the outer, authorized ExecuteMultiOperationRequest.Namespace. This allows a caller authorized for one namespace to bypass that namespace's limits/policies by setting the embedded start request's namespace to a different namespace. The workflow is still created in the outer (authorized) namespace; only validation/gating is performed under the wrong namespace context.
This issue affects Temporal: from 1.24.0 through 1.29.1. Fixed in 1.27.4, 1.28.2, 1.29.2.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

SetĀ frontend.enableExecuteMultiOperation to false

History

Tue, 30 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Description When frontend.enableExecuteMultiOperation is enabled, the server can apply namespace-scoped validation and feature gates for the embedded StartWorkflowExecutionRequest using its Namespace field rather than the outer, authorized ExecuteMultiOperationRequest.Namespace. This allows a caller authorized for one namespace to bypass that namespace's limits/policies by setting the embedded start request's namespace to a different namespace. The workflow is still created in the outer (authorized) namespace; only validation/gating is performed under the wrong namespace context. This issue affects Temporal: from 1.24.0 through 1.29.1. Fixed in 1.27.4, 1.28.2, 1.29.2.
Title ExecuteMultiOperation Namespace Policy Bypass
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 1.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/S:N/AU:Y/R:U/RE:L/U:Green'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Temporal

Published:

Updated: 2025-12-30T20:17:47.201Z

Reserved: 2025-12-19T19:18:54.548Z

Link: CVE-2025-14986

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-30T21:15:42.773

Modified: 2025-12-30T21:15:42.773

Link: CVE-2025-14986

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses