Allocation of Resources Without Limits or Throttling Affecting github.com/open-feature/flagd/flagd/pkg/service/flag-evaluation/ofrep package, versions <0.14.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENFEATUREFLAGDFLAGDPKGSERVICEFLAGEVALUATIONOFREP-15518712
  • published13 Mar 2026
  • disclosed11 Mar 2026
  • creditDaniel Pallinger

Introduced: 11 Mar 2026

NewCVE-2026-31866  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade github.com/open-feature/flagd/flagd/pkg/service/flag-evaluation/ofrep to version 0.14.2 or higher.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the evaluation endpoints, including /ofrep/v1/evaluate/flags/{flagKey}, /ofrep/v1/evaluate/flags, and various gRPC methods. An attacker can cause memory exhaustion and process termination by sending a single HTTP or gRPC request with an excessively large body, leading to service disruption and repeated denial of service.

References

CVSS Base Scores

version 4.0
version 3.1