Skip to content

LookupResources Cursor section tampering can crash SpiceDB process via tuple.MustParse panic

Low
tstirrat15 published GHSA-vhvq-fv9f-wh4q Feb 6, 2026

Package

gomod github.com/authzed/spicedb (Go)

Affected versions

v1.29.3

Patched versions

v1.49.1

Description

Description

A malformed or tampered-with LookupResources Cursor token can cause a panic in the SpiceDB process if it fails to parse. If an attacker were able to make requests to a SpiceDB instance, they could affect its availability.

Reproduction

If you were to take a cursor from one LookupResources call and decode it according to the logic that SpiceDB uses and modify the Sections field to include an invalid relationship string, the process will panic.

Impact

An attacker would need both the ability to create a gRPC connection to your SpiceDB instance and a valid token, or else the ability to pass a cursor token from outside your application through to your SpiceDB instance.

If an attacker had this ability, they could bring down SpiceDB instances, reducing the availability of SpiceDB and any service that depends on it.

Mechanism

The SpiceDB process does not validate the contents of this Sections component of the Cursor message. In affected versions, it uses a parsing function that calls panic if the value cannot be parsed as a relationship.

Fix

This issue was fixed in #2878.

Remediations

  • Prevent client control of the optional_cursor field in LookupResources calls
  • Upgrade to an unaffected version

Severity

Low

CVE ID

No known CVE

Weaknesses

Uncaught Exception

An exception is thrown from a function, but it is not caught. Learn more on MITRE.

Credits