Incorrect Authorization Affecting github.com/openfga/openfga/pkg/server/commands/reverseexpand package, versions <1.8.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMOPENFGAOPENFGAPKGSERVERCOMMANDSREVERSEEXPAND-8738192
  • published20 Feb 2025
  • disclosed19 Feb 2025
  • creditUnknown

Introduced: 19 Feb 2025

NewCVE-2025-25196  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade github.com/openfga/openfga/pkg/server/commands/reverseexpand to version 1.8.5 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Authorization in the shouldCheckPublicAssignable() function used by Check and List Object API requests. A user can bypass authorization controls by manipulating the inputs to these endpoints.

All of the following conditions must be met for an application to be vulnerable:

  1. Check or ListObjects are called with a model that has a relation that is directly assignable to both public access AND userset with the same type.

  2. A type-bound public access tuple is assigned to an object.

  3. A userset tuple is not assigned to the same object.

  4. The Check request's user field is a userset that has the same type as the type-bound public access tuple's user type

References

CVSS Scores

version 4.0
version 3.1