CVE-2026-41131
| Summary |
OpenFGA is an authorization/permission engine built for developers. Prior to version 1.14.1, in specific scenarios, models using conditions with caching enabled can result in two different check requests producing the same cache key. This could result in OpenFGA reusing an earlier cached result for a subsequent request. The preconditions for vulnerability are the model having relations which rely on condition evaluation and the user having caching enabled. OpenFGA v1.14.1 contains a fix.
|
| Publication Date |
April 22, 2026, 9:16 a.m. |
| Registration Date |
April 25, 2026, 4:04 a.m. |
| Last Update |
April 24, 2026, 10:44 p.m. |
|
CVSS3.1 : MEDIUM
|
| スコア |
5.0
|
| Vector |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
高 |
| 攻撃に必要な特権レベル(PR) |
低 |
| 利用者の関与(UI) |
不要 |
| 影響の想定範囲(S) |
変更なし |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
低 |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:openfga:helm_charts:*:*:*:*:*:openfga:*:* |
|
|
|
0.3.1 |
| cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:* |
|
|
|
1.14.1 |
Related information, measures and tools
Common Vulnerabilities List