Impact
OpenFGA is an authorization engine. The vulnerability, identified as OpenFGA Improper Policy Enforcement, allows an attacker to bypass defined access controls when certain Check calls are executed. The flaw is due to a model that defines relations with both public and non‑public bindings and tuples that assign different permission levels. By crafting such a model, an attacker can obtain access to resources they should not be able to. This is an access control weakness (CWE‑1220 and CWE‑863) that can lead to unauthorized read or modify operations.
Affected Systems
The flaw affects OpenFGA v1.8.5 through v1.11.2, including the corresponding Docker images and Helm chart releases (openfga‑0.2.22 to openfga‑0.2.51). Deployments using these versions are vulnerable. The vulnerability is fixed in v1.11.3. Users of both container and chart deployments should verify they are not on an affected version.
Risk and Exploitability
The CVSS base score is 5.8, indicating medium severity. The EPSS score is reported to be less than 1 percent, suggesting a very low exploitation probability at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to execute Check calls with a specifically crafted policy model and tuples, implying that the attack vector is limited to environments where the attacker can influence or create policy definitions. Because it does not require remote code execution, the risk is mainly confined to unauthorized privilege escalation within an OpenFGA deployment.
OpenCVE Enrichment
Github GHSA