{"api_version":"1","generated_at":"2026-04-23T00:59:57+00:00","cve":"CVE-2022-23542","urls":{"html":"https://cve.report/CVE-2022-23542","api":"https://cve.report/api/cve/CVE-2022-23542.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-23542","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-23542"},"summary":{"title":"CVE-2022-23542","description":"OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. During an internal security assessment, it was discovered that OpenFGA version 0.3.0 is vulnerable to authorization bypass under certain conditions. This issue has been patched in version 0.3.1 and is backward compatible.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-12-20 21:15:00","updated_at":"2023-11-07 03:44:00"},"problem_types":["CWE-285"],"metrics":[],"references":[{"url":"https://github.com/openfga/openfga/pull/422","name":"https://github.com/openfga/openfga/pull/422","refsource":"MISC","tags":[],"title":"fix: filter reads by type restriction in direct relationship lookups by jon-whit · Pull Request #422 · openfga/openfga · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m","name":"https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m","refsource":"MISC","tags":[],"title":"OpenFGA Authorization Bypass · Advisory · openfga/openfga · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/openfga/openfga/releases/tag/v0.3.1","name":"https://github.com/openfga/openfga/releases/tag/v0.3.1","refsource":"MISC","tags":[],"title":"Release v0.3.1 · openfga/openfga · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-23542","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23542","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"23542","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openfga","cpe5":"openfga","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-23542","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. During an internal security assessment, it was discovered that OpenFGA version 0.3.0 is vulnerable to authorization bypass under certain conditions. This issue has been patched in version 0.3.1 and is backward compatible."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-285: Improper Authorization","cweId":"CWE-285"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"openfga","product":{"product_data":[{"product_name":"openfga","version":{"version_data":[{"version_value":"= 0.3.0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m","refsource":"MISC","name":"https://github.com/openfga/openfga/security/advisories/GHSA-m3q4-7qmj-657m"},{"url":"https://github.com/openfga/openfga/pull/422","refsource":"MISC","name":"https://github.com/openfga/openfga/pull/422"},{"url":"https://github.com/openfga/openfga/releases/tag/v0.3.1","refsource":"MISC","name":"https://github.com/openfga/openfga/releases/tag/v0.3.1"}]},"source":{"advisory":"GHSA-m3q4-7qmj-657m","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2022-12-20 21:15:00","lastModifiedDate":"2023-11-07 03:44:00","problem_types":["CWE-285"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:*","versionEndExcluding":"0.3.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"23542","Ordinal":"226320","Title":"CVE-2022-23542","CVE":"CVE-2022-23542","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"23542","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}