CVE-2025-64529
BaseFortify
Publication date: 2025-11-10
Last updated on: 2025-11-21
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| authzed | spicedb | to 1.45.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in SpiceDB versions prior to 1.45.2 occurs when users employ the exclusion operator in their authorization schema, configure the server with a write-relationships-max-updates-per-call value greater than 6500, and issue WriteRelationships calls with a payload larger than the datastore allows. In such cases, the WriteRelationships call returns a successful response even though it actually failed, leading to incorrect permission check results when those relationships are read to resolve relations involving the exclusion operator. Version 1.45.2 fixes this issue, and a workaround is to set the write-relationships-max-updates-per-call to 1000.
How can this vulnerability impact me? :
This vulnerability can cause your application to receive incorrect permission check results because failed WriteRelationships calls are reported as successful. This means unauthorized access might be granted or legitimate access denied, potentially compromising the security of your application permissions and leading to security risks.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, either upgrade SpiceDB to version 1.45.2 or later, which contains the patch for this issue, or as a workaround, set the server configuration parameter `--write-relationships-max-updates-per-call` to 1000 to avoid triggering the bug.