Temporal Paradox: The Cross-Namespace Authorization Bypass
Vulnerability ID: CVE-2025-14987
CVSS Score: 5.3
Published: 2025-12-30
A logic flaw in Temporal's gRPC authorization interceptor allows authenticated workers in one namespace to execute unauthorized commands (Signaling, Canceling, etc.) against workflows in a completely different namespace.
TL;DR
Temporal trusted the envelope but ignored the letter inside. A worker authorized for 'Namespace A' could embed commands targeting 'Namespace B' within a standard task completion response. Because the server only validated the worker's access to 'Namespace A', the cross-namespace commands were executed without a secondary permission check. Fixed by adding 'Deep Inspection' logic to the authorization layer.
⚠️ Exploit Status: POC
Technical Details
- CVE ID: CVE-2025-14987
- CVSS 4.0: 5.3 (Medium)
- CWE: CWE-863 (Incorrect Authorization)
- Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
- Impact: Cross-Namespace Command Execution
- Patch Commit: b292a32bacdfa6472affd90f0a940408d5839cfa
Affected Systems
- Temporal Server
-
Temporal Server: <= 1.27.3 (Fixed in:
1.27.4) -
Temporal Server: 1.28.0 - 1.28.1 (Fixed in:
1.28.2) -
Temporal Server: 1.29.0 - 1.29.1 (Fixed in:
1.29.2)
Code Analysis
Commit: b292a32
Fix authorization for cross-namespace commands
func (a *Interceptor) authorizeTargetNamespaces(...) ...
Exploit Details
- GitHub: Unit tests demonstrating the authorized vs unauthorized cross-namespace behavior
Mitigation Strategies
- Upgrade to patched versions immediately.
- Disable cross-namespace commands via dynamic configuration if patching is delayed.
- Audit existing workflows for unexpected cross-namespace activity.
Remediation Steps:
- Identify current Temporal Server version.
- If version is <= 1.27.3, 1.28.0-1.28.1, or 1.29.0-1.29.1, schedule maintenance.
- Deploy version 1.27.4, 1.28.2, or 1.29.2.
- Verify 'system.enableCrossNamespaceCommands' setting aligns with security policy.
References
Read the full report for CVE-2025-14987 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)