Temporal has an Incorrect Authorization vulnerability
Moderate severity
GitHub Reviewed
Published
Dec 30, 2025
to the GitHub Advisory Database
•
Updated Jan 2, 2026
Package
Affected versions
< 1.27.4
>= 1.28.0, < 1.28.2
>= 1.29.0, < 1.29.2
>= 1.29.0-0, < 1.29.0-135.0.0.20251218190115-b292a32bacdf
Patched versions
1.27.4
1.28.2
1.29.2
1.29.0-135.0.0.20251218190115-b292a32bacdf
Description
Published by the National Vulnerability Database
Dec 30, 2025
Published to the GitHub Advisory Database
Dec 30, 2025
Reviewed
Jan 2, 2026
Last updated
Jan 2, 2026
When system.enableCrossNamespaceCommands is enabled (on by default), the Temporal server permits certain workflow task commands (e.g. StartChildWorkflowExecution, SignalExternalWorkflowExecution, RequestCancelExternalWorkflowExecution) to target a different namespace than the namespace authorized at the gRPC boundary. The frontend authorizes RespondWorkflowTaskCompleted based on the outer request namespace, but the history service later resolves and executes the command using the namespace embedded in command attributes without authorizing the caller for that target namespace. This can allow a worker authorized for one namespace to create, signal, or cancel workflows in another namespace.
This issue affects Temporal: through 1.29.1. Fixed in 1.27.4, 1.28.2, 1.29.2.
References