Cyber Posture

CVE-2025-25196

Critical

Published: 19 February 2025

Published
19 February 2025
Modified
31 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 26.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-25196 is an authorization bypass vulnerability affecting OpenFGA versions prior to v1.8.4, including Helm chart versions before openfga-0.2.22 and Docker images before v1.8.4. OpenFGA is a high-performance authorization and permission engine inspired by Google Zanzibar. The flaw occurs during certain Check and ListObjects API calls when a model has a relation directly assignable to both public access and a userset of the same type, a type-bound public access tuple is assigned to an object, no userset tuple is assigned to the same object, and the Check request's user field is a userset matching the type of the public access tuple's user.

The vulnerability can be exploited by unauthenticated remote attackers with network access to the OpenFGA instance, requiring low complexity and no privileges. By crafting a Check or ListObjects request meeting the specified conditions, attackers can bypass authorization checks, potentially gaining high confidentiality, integrity, and availability impacts as reflected in the CVSS v3.1 base score of 9.8. This allows unauthorized access to sensitive authorization data or objects that should be restricted.

The official security advisory and patch commit recommend upgrading to OpenFGA v1.8.5, which is backwards compatible and addresses the issue. No workarounds are available. Details are provided in the GitHub security advisory at https://github.com/openfga/openfga/security/advisories/GHSA-g4v5-6f5p-m38j and the fixing commit at https://github.com/openfga/openfga/commit/0aee4f47e0c642de78831ceb27bb62b116f49588.

Details

CWE(s)
CWE-285

Affected Products

openfga
helm charts
≤ 0.2.22
openfga
openfga
≤ 1.8.5

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authorization bypass vulnerability in a network-accessible OpenFGA service allows unauthenticated remote attackers to exploit the public-facing application via crafted Check/ListObjects API calls to bypass authorization checks.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References