OpenFGA is a high-performance and flexible authorization/permission engine. Some end users of OpenFGA v1.5.0 or later are vulnerable to authorization bypass when calling Check or ListObjects APIs. You are very likely affected if your model involves exclusion (e.g. `a but not b`) or intersection (e.g. `a and b`). This vulnerability is fixed in v1.5.3.
Metrics
Affected Vendors & Products
References
History
Mon, 05 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-04-16T21:40:58.856Z
Updated: 2024-08-02T01:52:56.950Z
Reserved: 2024-04-03T17:55:32.646Z
Link: CVE-2024-31452
Updated: 2024-05-30T15:46:29.475Z
Status : Analyzed
Published: 2024-04-16T22:15:35.003
Modified: 2026-01-05T16:20:42.307
Link: CVE-2024-31452
No data.