CVE-2024-56323
Severity CVSS v4.0:
MEDIUM
Type:
CWE-285
Improper Authorization
Publication date:
13/01/2025
Last modified:
31/12/2025
Description
OpenFGA is an authorization/permission engine. IN OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass under the following conditions: 1. calling Check API or ListObjects with a model that uses [conditions](https://openfga.dev/docs/modeling/conditions), and 2. calling Check API or ListObjects API with [contextual tuples](https://openfga.dev/docs/concepts#what-are-contextual-tuples) that include conditions and 3. OpenFGA is configured with caching enabled (`OPENFGA_CHECK_QUERY_CACHE_ENABLED`). Users are advised to upgrade to v1.8.3. There are no known workarounds for this vulnerability.
Impact
Base Score 4.0
5.80
Severity 4.0
MEDIUM
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openfga:helm_charts:*:*:*:*:*:*:*:* | 0.1.38 (including) | 0.2.19 (excluding) |
| cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:* | 1.3.8 (including) | 1.8.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



