| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jwvj-g8pc-cx45 | OpenFGA's BatchCheck within-request deduplication produces incorrect authorization decisions via list-value cache-key collision |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
threat_severity
|
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openfga
Openfga openfga |
|
| Vendors & Products |
Openfga
Openfga openfga |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. From 1.8.0 to 1.13.1, under specific conditions, BatchCheck calls with multiple checks sent for the same object, relation, and user combination can result in improper policy enforcement. This vulnerability is fixed in 1.14.0. | |
| Title | OpenFGA's BatchCheck within-request deduplication produces incorrect authorization decisions via list-value cache-key collision | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T14:01:23.508Z
Reserved: 2026-03-31T19:38:31.616Z
Link: CVE-2026-34972
Updated: 2026-04-07T14:01:18.314Z
Status : Awaiting Analysis
Published: 2026-04-06T21:16:19.997
Modified: 2026-04-07T13:20:11.643
Link: CVE-2026-34972
OpenCVE Enrichment
Updated: 2026-04-08T19:50:31Z
Github GHSA