CVE-2025-14987

Temporal Paradox: The Cross-Namespace Authorization Bypass

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 2, 2026·5 min read·1 visit

Executive Summary (TL;DR)

Temporal trusted the envelope but ignored the letter inside. A worker authorized for 'Namespace A' could embed commands targeting 'Namespace B' within a standard task completion response. Because the server only validated the worker's access to 'Namespace A', the cross-namespace commands were executed without a secondary permission check. Fixed by adding 'Deep Inspection' logic to the authorization layer.

A logic flaw in Temporal's gRPC authorization interceptor allows authenticated workers in one namespace to execute unauthorized commands (Signaling, Canceling, etc.) against workflows in a completely different namespace.

Fix Analysis (1)

Technical Appendix

CVSS Score
5.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
EPSS Probability
0.05%
Top 100% most exploited

Affected Systems

Temporal Server

Affected Versions Detail

Product
Affected Versions
Fixed Version
Temporal Server
Temporal
<= 1.27.31.27.4
Temporal Server
Temporal
1.28.0 - 1.28.11.28.2
Temporal Server
Temporal
1.29.0 - 1.29.11.29.2
AttributeDetail
CVE IDCVE-2025-14987
CVSS 4.05.3 (Medium)
CWECWE-863 (Incorrect Authorization)
VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
ImpactCross-Namespace Command Execution
Patch Commitb292a32bacdfa6472affd90f0a940408d5839cfa
CWE-863
Incorrect Authorization

The product provides an authorization method that does not properly verify that the user has the necessary permissions to access the requested resource.

Vulnerability Timeline

Patch authored and committed
2025-02-04
Advisory Published
2025-02-12

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.