CVE-2025-14986

The Old Switcheroo: Bypassing Namespace Policies in Temporal (CVE-2025-14986)

Alon Barad
Alon Barad
Software Engineer

Jan 1, 2026·5 min read·2 visits

Executive Summary (TL;DR)

Temporal's frontend failed to cross-check the namespace of an internal 'embedded' request against the outer wrapper request. An attacker could wrap a `StartWorkflow` command claiming to be for 'Namespace B' (high limits) inside a request authorized for 'Namespace A' (low limits). The server validated against B but executed in A, effectively bypassing namespace-level constraints.

A logic flaw in Temporal's `ExecuteMultiOperation` API allowed authenticated users to execute workflows in one namespace while validating them against the policies of another. By embedding a request with a mismatched namespace ID, attackers could bypass rate limits and feature gates.

Technical Appendix

CVSS Score
1.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/S:N/AU:Y/R:U/RE:L/U:Green
EPSS Probability
0.05%
Top 88% most exploited

Affected Systems

Temporal Server 1.24.0Temporal Server 1.25.xTemporal Server 1.26.xTemporal Server 1.27.0 - 1.27.3Temporal Server 1.28.0 - 1.28.1Temporal Server 1.29.0 - 1.29.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
Temporal Server
Temporal Technologies
>= 1.24.0, < 1.27.41.27.4
Temporal Server
Temporal Technologies
>= 1.28.0, < 1.28.21.28.2
Temporal Server
Temporal Technologies
>= 1.29.0, < 1.29.21.29.2
AttributeDetail
CWECWE-863 (Incorrect Authorization)
CVSS v4.01.3 (Low)
VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N
Attack VectorNetwork (gRPC)
Exploit ComplexityLow
Privileges RequiredLow (Valid Namespace Access)
CWE-863
Incorrect Authorization

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

Vulnerability Timeline

Vulnerability Disclosed/Patched in PR #8839
2025-02-01
Patch Released in v1.29.2
2025-02-05

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.