Description
OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. In versions prior to 1.13.1, under specific conditions, models using conditions with caching enabled can result in two different check requests producing the same cache key. This can result in OpenFGA reusing an earlier cached result for a different request. Users are affected if the model has relations which rely on condition evaluation andncaching is enabled. OpenFGA v1.13.1 contains a patch.
Published: 2026-03-27
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass
Action: Apply Patch
AI Analysis

Impact

OpenFGA, a permission engine, contains a flaw where models that use conditions with caching enabled can produce identical cache keys for two distinct authorization check requests. When this occurs, the engine may return the cached result from the first request for the second, unintended request, allowing a user to be authorized for resources they should not have access to. This represents an authorization bypass that compromises confidentiality and integrity of protected data, but does not directly enable remote code execution or denial of service.

Affected Systems

The vulnerability affects all instances of openfga:openfga running versions prior to 1.13.1. Users of the OpenFGA engine that have models with condition-based relations and caching enabled are impacted. Versions 1.13.1 and later contain the remediation patch.

Risk and Exploitability

The CVSS score of 5.8 indicates a medium severity vulnerability. EPSS data is not available, so the current exploitation likelihood cannot be quantified, and the issue is not listed in CISA's KEV catalog. The most likely attack vector is through normal API calls to the authorization service – an attacker could craft two check requests that meet the caching key collision criteria and obtain unauthorized access. Because the flaw manifests only when caching is enabled for condition-based models, environments that have already disabled caching for such models are less exposed.

Generated by OpenCVE AI on March 27, 2026 at 06:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch by upgrading to OpenFGA v1.13.1 or later.
  • If immediate upgrade is not possible, disable caching for models that use condition-based relations in the OpenFGA configuration.
  • After disabling caching, monitor access logs for anomalous authorization patterns to ensure the issue is resolved.

Generated by OpenCVE AI on March 27, 2026 at 06:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h6c8-cww8-35hf OpenFGA has an Authorization Bypass through cached keys
History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Openfga
Openfga openfga
Vendors & Products Openfga
Openfga openfga

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. In versions prior to 1.13.1, under specific conditions, models using conditions with caching enabled can result in two different check requests producing the same cache key. This can result in OpenFGA reusing an earlier cached result for a different request. Users are affected if the model has relations which rely on condition evaluation andncaching is enabled. OpenFGA v1.13.1 contains a patch.
Title OpenFGA has an Authorization Bypass through cached keys
Weaknesses CWE-1289
CWE-20
CWE-345
References
Metrics cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T00:27:40.726Z

Reserved: 2026-03-23T17:34:57.560Z

Link: CVE-2026-33729

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T01:16:20.367

Modified: 2026-03-27T01:16:20.367

Link: CVE-2026-33729

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:32Z

Weaknesses