Description
The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests without credentials. This endpoint is registered on the same port as WorkflowService and cannot be disabled independently. An attacker with network access to the frontend port could open the replication stream without authentication. Data exfiltration is possible, but  only when a configured replication target is correctly configured and the attacker has knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before returning replication data.




Temporal Cloud is not affected.
Published: 2026-04-10
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass permitting potential data exfiltration via replication stream
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from missing authentication in the frontend gRPC server’s streaming interceptor chain. When a ClaimMapper and Authorizer are configured, unary RPCs require credentials, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint does not enforce authentication. Consequently, an attacker with access to the frontend port can open the replication stream without credentials. Data exfiltration is possible, yet it requires a correctly configured replication target and the attacker’s knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before transmitting data.

Affected Systems

Executables from Temporal Technologies, Inc. marked as temporal are impacted. Any deployment of Temporal that includes a replication target and uses the default streaming replication endpoint is vulnerable until an update is applied. The patch versions listed in the advisory – effectively v1.28.4 and all later releases – have addressed the issue.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not actively exploited at scale. The most likely attack vector is a malicious entity that can reach the frontend gRPC port, which is often exposed to internal or compromised networks. Exploitation also mandates knowledge of the cluster configuration and a functional replication target; therefore, risk is higher in environments where replication is enabled and not properly isolated. Users should treat the vulnerability as potentially serious if sensitive workflow history is present.

Generated by OpenCVE AI on April 10, 2026 at 22:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Temporal to v1.28.4 or later, which includes the missing authentication fix
  • Ensure that replication targets are only configured for trusted clusters and that cluster IDs and peer membership checks are correctly enforced
  • Restrict network access to the Temporal frontend gRPC port to trusted hosts or subnetworks to limit attacker reach
  • Enable monitoring for unexpected replication stream activity and audit replication logs for unauthorized data transfers

Generated by OpenCVE AI on April 10, 2026 at 22:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q98v-9f9w-f49q Temporal does not enforce authentication and authorization for the streaming AdminService/StreamWorkflowReplicationMessages endpoint
History

Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Temporal
Temporal temporal
Vendors & Products Temporal
Temporal temporal

Fri, 10 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Description The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests without credentials. This endpoint is registered on the same port as WorkflowService and cannot be disabled independently. An attacker with network access to the frontend port could open the replication stream without authentication. Data exfiltration is possible, but  only when a configured replication target is correctly configured and the attacker has knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before returning replication data. Temporal Cloud is not affected.
Title Missing Authentication on Streaming gRPC Replication Endpoint
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:L/SI:N/SA:N/S:N/AU:N/R:U/RE:L'}


Subscriptions

Temporal Temporal
cve-icon MITRE

Status: PUBLISHED

Assigner: Temporal

Published:

Updated: 2026-04-13T16:10:49.014Z

Reserved: 2026-04-06T21:59:05.129Z

Link: CVE-2026-5724

cve-icon Vulnrichment

Updated: 2026-04-13T16:10:42.117Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-10T21:16:28.497

Modified: 2026-04-13T15:02:06.187

Link: CVE-2026-5724

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:19Z

Weaknesses