🔐 CVE Alert

CVE-2026-5724

UNKNOWN 0.0

Missing Authentication on Streaming gRPC Replication Endpoint

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
28th

The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests without credentials. This endpoint is registered on the same port as WorkflowService and cannot be disabled independently. An attacker with network access to the frontend port could open the replication stream without authentication. Data exfiltration is possible, but  only when a configured replication target is correctly configured and the attacker has knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before returning replication data. Temporal Cloud is not affected.

CWE CWE-306
Vendor temporal technologies, inc.
Product temporal
Published Apr 10, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for temporal technologies, inc. temporal

Be the first to know when new unknown vulnerabilities affecting temporal technologies, inc. temporal are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Temporal Technologies, Inc. / temporal
1.24.0 ≤ 1.30.3 1.24.0 ≤ 1.29.5 1.24.0 ≤ 1.28.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/temporalio/temporal/releases/tag/v1.29.6 github.com: https://github.com/temporalio/temporal/releases/tag/v1.30.4 github.com: https://github.com/temporalio/temporal/releases/tag/v1.28.4

Credits

Tiberiu Baron of UiPath's security team