Incorrect Authorization Affecting github.com/openfga/openfga/internal/graph package, versions >=1.9.3 <1.9.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENFGAOPENFGAINTERNALGRAPH-12008936
  • published19 Aug 2025
  • disclosed18 Aug 2025
  • creditDominic Harries, rrozza-apolitical

Introduced: 18 Aug 2025

NewCVE-2025-55213  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade github.com/openfga/openfga/internal/graph to version 1.9.5 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Authorization via improper enforcement of authorization policies in the Check and ListObject processes.

Note:

The users are affected under the following preconditions:

  • Check API or ListObjects are called with an authorization model that has a relationship directly assignable by more than 1 userset with same type, and
  • There are check or list object queries that rely on the above relationship, and
  • There are userset tuples that are assigned to the above relationship

##Workaround

For users that are not able to upgrade to the fixed version it is recommended to downgrade to v1.9.2 with enable-check-optimizations removed from OPENFGA_EXPERIMENTALS

References

CVSS Base Scores

version 4.0
version 3.1