CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-14987
5.30.05%

Temporal Paradox: The Cross-Namespace Authorization Bypass

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 2, 2026·5 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Temporal trusted the envelope but ignored the letter inside. A worker authorized for 'Namespace A' could embed commands targeting 'Namespace B' within a standard task completion response. Because the server only validated the worker's access to 'Namespace A', the cross-namespace commands were executed without a secondary permission check. Fixed by adding 'Deep Inspection' logic to the authorization layer.

A logic flaw in Temporal's gRPC authorization interceptor allows authenticated workers in one namespace to execute unauthorized commands (Signaling, Canceling, etc.) against workflows in a completely different namespace.

Official Patches

TemporalRelease notes for version 1.29.2

Fix Analysis (1)

Technical Appendix

CVSS Score
5.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
EPSS Probability
0.05%
Top 100% most exploited

Affected Systems

Temporal Server

Affected Versions Detail

Product
Affected Versions
Fixed Version
Temporal Server
Temporal
<= 1.27.31.27.4
Temporal Server
Temporal
1.28.0 - 1.28.11.28.2
Temporal Server
Temporal
1.29.0 - 1.29.11.29.2
AttributeDetail
CVE IDCVE-2025-14987
CVSS 4.05.3 (Medium)
CWECWE-863 (Incorrect Authorization)
VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
ImpactCross-Namespace Command Execution
Patch Commitb292a32bacdfa6472affd90f0a940408d5839cfa

MITRE ATT&CK Mapping

T1068Exploitation for Privilege Escalation
Privilege Escalation
T1565.001Data Manipulation: Stored Data Manipulation
Impact
CWE-863
Incorrect Authorization

The product provides an authorization method that does not properly verify that the user has the necessary permissions to access the requested resource.

Known Exploits & Detection

GitHubUnit tests demonstrating the authorized vs unauthorized cross-namespace behavior

Vulnerability Timeline

Patch authored and committed
2025-02-04
Advisory Published
2025-02-12

References & Sources

  • [1]GitHub Security Advisory
  • [2]Patch Commit
Related Vulnerabilities
CVE-2025-14986

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.