When system.enableCrossNamespaceCommands is enabled (on by default), the Temporal server permits certain workflow task commands (e.g. StartChildWorkflowExecution, SignalExternalWorkflowExecution, RequestCancelExternalWorkflowExecution) to target a different namespace than the namespace authorized at the gRPC boundary. The frontend authorizes RespondWorkflowTaskCompleted based on the outer request namespace, but the history service later resolves and executes the command using the namespace embedded in command attributes without authorizing the caller for that target namespace. This can allow a worker authorized for one namespace to create, signal, or cancel workflows in another namespace.
This issue affects Temporal: through 1.29.1. Fixed in 1.27.4, 1.28.2, 1.29.2.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Set system.enableCrossNamespaceCommands to false, unless cross-namespace workflow-task commands are explicitly required.

History

Tue, 30 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Description When system.enableCrossNamespaceCommands is enabled (on by default), the Temporal server permits certain workflow task commands (e.g. StartChildWorkflowExecution, SignalExternalWorkflowExecution, RequestCancelExternalWorkflowExecution) to target a different namespace than the namespace authorized at the gRPC boundary. The frontend authorizes RespondWorkflowTaskCompleted based on the outer request namespace, but the history service later resolves and executes the command using the namespace embedded in command attributes without authorizing the caller for that target namespace. This can allow a worker authorized for one namespace to create, signal, or cancel workflows in another namespace. This issue affects Temporal: through 1.29.1. Fixed in 1.27.4, 1.28.2, 1.29.2.
Title Cross Namespace Commands Authorization Bypass
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Temporal

Published:

Updated: 2025-12-30T20:16:20.154Z

Reserved: 2025-12-19T19:19:01.833Z

Link: CVE-2025-14987

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-30T21:15:43.343

Modified: 2025-12-30T21:15:43.343

Link: CVE-2025-14987

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses