CVE-2026-33729

ADVISORY - github

Summary

Description

In OpenFGA, under specific conditions, models using conditions with caching enabled can result in two different check requests producing the same cache key. This can result in OpenFGA reusing an earlier cached result for a different request.

Am I Affected?

Users are affected if the following preconditions are met:

  1. The model has relations which rely on condition evaluation.
  2. Caching is enabled.

Fix

Upgrade to OpenFGA v1.13.1.

Acknowledgement

OpenFGA would like to thank @Amemoyoi for the discovery and responsible disclosure.

EPSS Score: 0.00012 (0.016)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Improper Validation of Unsafe Equivalence in Input

Improper Input Validation

Insufficient Verification of Data Authenticity

ADVISORY - github

Improper Validation of Unsafe Equivalence in Input

Improper Input Validation

Insufficient Verification of Data Authenticity


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in