Headline
GHSA-hmhp-gh8m-c8xp: Temporal has an Incorrect Authorization vulnerability
When system.enableCrossNamespaceCommands is enabled (on by default), the Temporal server permits certain workflow task commands (e.g. StartChildWorkflowExecution, SignalExternalWorkflowExecution, RequestCancelExternalWorkflowExecution) to target a different namespace than the namespace authorized at the gRPC boundary. The frontend authorizes RespondWorkflowTaskCompleted based on the outer request namespace, but the history service later resolves and executes the command using the namespace embedded in command attributes without authorizing the caller for that target namespace. This can allow a worker authorized for one namespace to create, signal, or cancel workflows in another namespace. This issue affects Temporal: through 1.29.1. Fixed in 1.27.4, 1.28.2, 1.29.2.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-14987
Temporal has an Incorrect Authorization vulnerability
Moderate severity GitHub Reviewed Published Dec 30, 2025 to the GitHub Advisory Database • Updated Jan 2, 2026
Package
gomod go.temporal.io/server (Go)
Affected versions
< 1.27.4
>= 1.28.0, < 1.28.2
>= 1.29.0, < 1.29.2
>= 1.29.0-0, < 1.29.0-135.0.0.20251218190115-b292a32bacdf
Patched versions
1.27.4
1.28.2
1.29.2
1.29.0-135.0.0.20251218190115-b292a32bacdf
Published to the GitHub Advisory Database
Dec 30, 2025