Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/openfga/openfga
  4. ›
  5. CVE-2024-56323

CVE-2024-56323: OpenFGA Authorization Bypass

January 13, 2025 (updated January 14, 2025)

Overview

OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass when certain Check and ListObject calls are executed.

Am I Affected?

You are affected by this authorization bypass vulnerability if you are using OpenFGA v1.3.8 to v1.8.2, specifically under the following conditions:

  1. Calling Check API or ListObjects with a model that uses conditions, and
  2. OpenFGA is configured with caching enabled (OPENFGA_CHECK_QUERY_CACHE_ENABLED), and
  3. Check API call or ListObjects API calls contain contextual tuples that include conditions.

Fix

Upgrade to v1.8.3. This upgrade is backwards compatible.

References

  • github.com/advisories/GHSA-32q6-rr98-cjqv
  • github.com/openfga/openfga
  • github.com/openfga/openfga/security/advisories/GHSA-32q6-rr98-cjqv
  • nvd.nist.gov/vuln/detail/CVE-2024-56323

Code Behaviors & Features

Detect and mitigate CVE-2024-56323 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.3.8 before 1.8.3

Fixed versions

  • 1.8.3

Solution

Upgrade to version 1.8.3 or above.

Weakness

  • CWE-285: Improper Authorization

Source file

go/github.com/openfga/openfga/CVE-2024-56323.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:09 +0000.