CVE-2025-55213
Published: 18 August 2025
Summary
CVE-2025-55213 is a critical-severity Incorrect Authorization (CWE-863) vulnerability in Openfga Helm Charts. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires enforcement of approved authorizations in accordance with access control policies, directly countering the improper policy enforcement during OpenFGA Check and ListObject calls.
Mandates a reference monitor to enforce access control policies, providing robust mediation against authorization bypasses in engines like OpenFGA.
Ensures timely identification, reporting, and correction of flaws like the one in OpenFGA v1.9.3-v1.9.4, preventing exploitation via patching to v1.9.5.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper policy enforcement in network-accessible OpenFGA service enables remote bypass of authorization checks, directly facilitating exploitation of public-facing apps for unauthorized access/privilege escalation.
NVD Description
OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA v1.9.3 to v1.9.4 ( openfga-0.2.40 <= Helm chart <= openfga-0.2.41, v1.9.3 <= docker <= v.1.9.4) are vulnerable to improper policy enforcement when certain…
more
Check and ListObject calls are executed. This vulnerability is fixed in 1.9.5.
Deeper analysisAI
CVE-2025-55213 is an improper policy enforcement vulnerability (CWE-863) affecting OpenFGA, a high-performance authorization and permission engine inspired by Google Zanzibar. The issue impacts OpenFGA versions v1.9.3 through v1.9.4, including Helm chart releases from openfga-0.2.40 to openfga-0.2.41 and Docker images from v1.9.3 to v1.9.4. It arises during execution of specific Check and ListObject calls, allowing authorization policies to be bypassed.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially permitting unauthorized access, modification, or disruption of authorization decisions within OpenFGA deployments.
The vulnerability is addressed in OpenFGA version 1.9.5. Official mitigation guidance is available in the GitHub security advisory (GHSA-mgh9-4mwp-fg55) and the fixing commit (1a7e0e37fc4777c824b2386cac4867a66f3480b0), which practitioners should review for upgrade instructions and verification steps.
Details
- CWE(s)