Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

temporal

Source -

CNANVD

CNA CVEs -

2

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

1
Related CVEsRelated VendorsRelated AssignersReports
3Vulnerabilities found

CVE-2026-5724
Assigner-Temporal Technologies Inc.
ShareView Details
Assigner-Temporal Technologies Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.07% / 20.53%
||
7 Day CHG+0.01%
Published-10 Apr, 2026 | 21:06
Updated-13 Apr, 2026 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication on Streaming gRPC Replication Endpoint

The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests without credentials. This endpoint is registered on the same port as WorkflowService and cannot be disabled independently. An attacker with network access to the frontend port could open the replication stream without authentication. Data exfiltration is possible, but  only when a configured replication target is correctly configured and the attacker has knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before returning replication data. Temporal Cloud is not affected.

Action-Not Available
Vendor-Temporal Technologies, Inc.
Product-temporal
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-5199
Assigner-Temporal Technologies Inc.
ShareView Details
Assigner-Temporal Technologies Inc.
CVSS Score-2.3||LOW
EPSS-0.05% / 15.49%
||
7 Day CHG~0.00%
Published-01 Apr, 2026 | 17:49
Updated-03 Apr, 2026 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross Namespace Access via Batch Operation

A writer role user in an attacker-controlled namespace could signal, delete, and reset workflows or activities in a victim namespace on the same cluster. Exploitation requires the attacker to know or guess specific victim workflow ID(s) and, for signal operations, signal names. This was due to a bug introduced in Temporal Server v1.29.0 which inadvertently allowed an attacker to control the namespace name value instead of using the server's own trusted name value within the batch activity code. The batch activity validated the namespace ID but did not cross-check the namespace name against the worker's bound namespace, allowing the per-namespace worker's privileged credentials to operate on an arbitrary namespace. Exploitation requires a server configuration where internal components have cross-namespace authorization, such as deployment of the internal-frontend service or equivalent TLS-based authorization for internal identities. This vulnerability also impacted Temporal Cloud when the attacker and victim namespaces were on the same cell, with the same preconditions as self-hosted clusters.

Action-Not Available
Vendor-Temporal Technologies, Inc.
Product-temporal
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2023-3485
Assigner-Temporal Technologies Inc.
ShareView Details
Assigner-Temporal Technologies Inc.
CVSS Score-3||LOW
EPSS-0.03% / 7.20%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 17:37
Updated-28 Oct, 2024 | 13:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Default Authorization in Temporal Server

Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the normal Temporal server flow. It requires the namespace UUID and information from the workflow history for the target namespace. Under these conditions, it is possible to interfere with pending tasks in other namespaces, such as marking a task failed or completed. If a task is targeted for completion by the attacker, the targeted namespace must also be using the same data converter configuration as the initial, valid, namespace for the task completion payload to be decoded by workers in the target namespace.

Action-Not Available
Vendor-temporalTemporal Technologies Inc.
Product-temporalTemporal Server
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default