CVE-2026-34972

ADVISORY - github

Summary

Description

In OpenFGA, under specific conditions, BatchCheck calls with multiple checks sent for the same object, relation, and user combination can result in improper policy enforcement.

Am I affected?

You are affected if you meet the following preconditions:

  1. You execute BatchCheck operations which rely on context.
  2. Multiple checks are sent within a single BatchCheck operation for the same user/object/relation combination, each containing context.
  3. The contexts between those checks differ in a specific way

Fix

Upgrade to OpenFGA v1.14.0

Acknowledgement

OpenFGA would like to thank @bugbunny-research for the discovery and detailed report.

EPSS Score: 0.00034 (0.100)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Incorrect Authorization

ADVISORY - github

Incorrect Authorization

ADVISORY - redhat

Authorization Bypass Through User-Controlled Key


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in