Description
OpenFGA is an authorization/permission engine. OpenFGA versions 1.8.0 through 1.8.12 (corresponding to Helm chart openfga-0.2.16 through openfga-0.2.30 and docker 1.8.0 through 1.8.12) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users are affected under four specific conditions: First, calling Check API or ListObjects with an authorization model that has a relationship directly assignable by both type bound public access and userset; second, there are check or list object queries with contextual tuples for the relationship that can be directly assignable by both type bound public access and userset; third, those contextual tuples’s user field is an userset; and finally, type bound public access tuples are not assigned to the relationship. Users should upgrade to version 1.8.13 to receive a patch. The upgrade is backwards compatible.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-48371, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-48371 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- https://capec.mitre.org/data/definitions/1.html
- https://capec.mitre.org/data/definitions/104.html
- https://capec.mitre.org/data/definitions/127.html
- https://capec.mitre.org/data/definitions/13.html
- https://capec.mitre.org/data/definitions/17.html
- https://capec.mitre.org/data/definitions/39.html
- https://capec.mitre.org/data/definitions/402.html
- https://capec.mitre.org/data/definitions/45.html
- https://capec.mitre.org/data/definitions/5.html
- https://capec.mitre.org/data/definitions/51.html
- https://capec.mitre.org/data/definitions/59.html
- https://capec.mitre.org/data/definitions/60.html
- https://capec.mitre.org/data/definitions/647.html
- https://capec.mitre.org/data/definitions/668.html
- https://capec.mitre.org/data/definitions/76.html
- https://capec.mitre.org/data/definitions/77.html
- https://capec.mitre.org/data/definitions/87.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-48371