CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-14986
1.30.05%

The Old Switcheroo: Bypassing Namespace Policies in Temporal (CVE-2025-14986)

Alon Barad
Alon Barad
Software Engineer

Jan 1, 2026·5 min read·4 visits

No Known Exploit

Executive Summary (TL;DR)

Temporal's frontend failed to cross-check the namespace of an internal 'embedded' request against the outer wrapper request. An attacker could wrap a `StartWorkflow` command claiming to be for 'Namespace B' (high limits) inside a request authorized for 'Namespace A' (low limits). The server validated against B but executed in A, effectively bypassing namespace-level constraints.

A logic flaw in Temporal's `ExecuteMultiOperation` API allowed authenticated users to execute workflows in one namespace while validating them against the policies of another. By embedding a request with a mismatched namespace ID, attackers could bypass rate limits and feature gates.

Official Patches

TemporalPR #8839: Validate MultiOperation namespace match
TemporalTemporal v1.29.2 Release Notes

Technical Appendix

CVSS Score
1.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/S:N/AU:Y/R:U/RE:L/U:Green
EPSS Probability
0.05%
Top 88% most exploited

Affected Systems

Temporal Server 1.24.0Temporal Server 1.25.xTemporal Server 1.26.xTemporal Server 1.27.0 - 1.27.3Temporal Server 1.28.0 - 1.28.1Temporal Server 1.29.0 - 1.29.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
Temporal Server
Temporal Technologies
>= 1.24.0, < 1.27.41.27.4
Temporal Server
Temporal Technologies
>= 1.28.0, < 1.28.21.28.2
Temporal Server
Temporal Technologies
>= 1.29.0, < 1.29.21.29.2
AttributeDetail
CWECWE-863 (Incorrect Authorization)
CVSS v4.01.3 (Low)
VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N
Attack VectorNetwork (gRPC)
Exploit ComplexityLow
Privileges RequiredLow (Valid Namespace Access)

MITRE ATT&CK Mapping

T1078Valid Accounts
Defense Evasion
T1562Impair Defenses
Defense Evasion
CWE-863
Incorrect Authorization

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

Known Exploits & Detection

Manual AnalysisExploitation requires constructing a gRPC request with mismatched namespaces using a custom client.

Vulnerability Timeline

Vulnerability Disclosed/Patched in PR #8839
2025-02-01
Patch Released in v1.29.2
2025-02-05

References & Sources

  • [1]Temporal Security Advisories
  • [2]NVD - CVE-2025-14986

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.