{"id":"CVE-2024-42473","summary":"OpenFGA Authorization Bypass","details":"OpenFGA is an authorization/permission engine. OpenFGA v1.5.7 and v1.5.8 are vulnerable to authorization bypass when calling Check API with a model that uses `but not` and `from` expressions and a userset. Users should downgrade to v1.5.6 as soon as possible. This downgrade is backward compatible. As of time of publication, a patch is not available but OpenFGA's maintainers are planning a patch for inclusion in a future release.","aliases":["GHSA-3f6g-m4hr-59h8","GO-2024-3061"],"modified":"2026-04-18T04:15:34.549542Z","published":"2024-08-09T21:16:17.683Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42473.json","cwe_ids":["CWE-863"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42473.json"},{"type":"ADVISORY","url":"https://github.com/openfga/openfga/security/advisories/GHSA-3f6g-m4hr-59h8"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42473"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openfga/openfga","events":[{"introduced":"b57290210f0ab46b4ab7dbcdde10206ec9f32c8e"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42473.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}