๐Ÿ” CVE Alert

CVE-2026-41131

MEDIUM 5.0

OpenFGA has Improper Policy Enforcement

CVSS Score
5.0
EPSS Score
0.0%
EPSS Percentile
0th

OpenFGA is an authorization/permission engine built for developers. Prior to version 1.14.1, in specific scenarios, models using conditions with caching enabled can result in two different check requests producing the same cache key. This could result in OpenFGA reusing an earlier cached result for a subsequent request. The preconditions for vulnerability are the model having relations which rely on condition evaluation and the user having caching enabled. OpenFGA v1.14.1 contains a fix.

CWE CWE-863 CWE-706
Vendor openfga
Product openfga
Published Apr 21, 2026
Stay Ahead of the Next One

Get instant alerts for openfga openfga

Be the first to know when new medium vulnerabilities affecting openfga openfga are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

openfga / openfga
< 1.14.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openfga/openfga/security/advisories/GHSA-57j5-qwp2-vqp6 github.com: https://github.com/openfga/openfga/releases/tag/v1.14.1