CVE-2026-24851

8.8 HIGH

📋 TL;DR

OpenFGA versions 1.8.5 to 1.11.2 have an improper policy enforcement vulnerability that can allow unauthorized access when specific authorization models and tuple configurations exist. The vulnerability affects systems using OpenFGA for authorization decisions where certain relation assignments create conflicting access scenarios. This impacts anyone running vulnerable OpenFGA versions with authorization models containing specific relation configurations.

💻 Affected Systems

Products:
  • OpenFGA
Versions: v1.8.5 to v1.11.2 (Helm chart openfga-0.2.22 to openfga-0.2.51, Docker v1.8.5 to v1.11.2)
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Requires specific authorization model configuration with certain relation assignments and tuple combinations to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users gain access to sensitive resources or data they should not have permission to access, potentially leading to data breaches or privilege escalation.

🟠

Likely Case

Authorization bypass for specific resources where conflicting tuple assignments exist, allowing unintended access to certain objects.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place to detect unusual authorization patterns.

🌐 Internet-Facing: MEDIUM - Exploitation requires specific authorization model configurations and tuple assignments, but if present, could allow unauthorized access.
🏢 Internal Only: MEDIUM - Similar risk profile as internet-facing, though attack surface may be more limited to internal actors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific authorization model configurations and precise tuple assignments, making it complex to trigger accidentally.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.11.3

Vendor Advisory: https://github.com/openfga/openfga/security/advisories/GHSA-jq9f-gm9w-rwm9

Restart Required: Yes

Instructions:

1. Update OpenFGA to version 1.11.3 or later. 2. For Helm deployments, update to chart version openfga-0.2.52 or later. 3. For Docker deployments, pull the updated image tag. 4. Restart the OpenFGA service.

🔧 Temporary Workarounds

Review and modify authorization models

all

Audit authorization models to identify configurations with relations directly assignable by type bound public access and non-public access on the same object.

🧯 If You Can't Patch

  • Audit all authorization models for the specific vulnerable configuration patterns described in the advisory
  • Implement additional authorization checks at the application layer to validate OpenFGA decisions

🔍 How to Verify

Check if Vulnerable:

Check OpenFGA version and compare against affected range. Review authorization models for the specific configuration patterns mentioned in the advisory.

Check Version:

Check OpenFGA server logs or API response for version information, or run: openfga version (if CLI available)

Verify Fix Applied:

Confirm OpenFGA version is 1.11.3 or later. Test authorization checks that previously might have been vulnerable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authorization check patterns
  • Failed authorization attempts followed by unexpected successes

Network Indicators:

  • Unusual authorization API call patterns

SIEM Query:

Look for authorization check patterns that match the specific vulnerable configuration described in the advisory

🔗 References

📤 Share & Export