CVE-2026-5724
Published:April 10, 2026
Updated:April 23, 2026
The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests without credentials. This endpoint is registered on the same port as WorkflowService and cannot be disabled independently. An attacker with network access to the frontend port could open the replication stream without authentication. Data exfiltration is possible, but only when a configured replication target is correctly configured and the attacker has knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before returning replication data.
Temporal Cloud is not affected.
Affected Packages
https://github.com/temporalio/temporal.git (GITHUB):
Affected version(s) >=v0.1.0-beta <v1.28.4Fix Suggestion:
Update to version v1.28.4https://github.com/temporalio/temporal.git (GITHUB):
Affected version(s) >=v1.30.0 <v1.30.4Fix Suggestion:
Update to version v1.30.4https://github.com/temporalio/temporal.git (GITHUB):
Affected version(s) >=v1.29.0 <v1.29.6Fix Suggestion:
Update to version v1.29.6github.com/temporalio/temporal (GO):
Affected version(s) >=v1.30.0 <v1.30.4Fix Suggestion:
Update to version v1.30.4go.temporal.io/server (GO):
Affected version(s) >=v0.0.0-20210716060757-b36dbeb50ae7 <v1.28.4Fix Suggestion:
Update to version v1.28.4github.com/temporalio/temporal (GO):
Affected version(s) >=v1.29.0 <v1.29.6Fix Suggestion:
Update to version v1.29.6github.com/temporalio/temporal (GO):
Affected version(s) >=v0.1.0-beta <v1.28.4Fix Suggestion:
Update to version v1.28.4go.temporal.io/server (GO):
Affected version(s) >=v1.29.0-135.0 <v1.29.6Fix Suggestion:
Update to version v1.29.6Related Resources (5)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
PRESENT
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
LOW
Subsequent System Confidentiality
LOW
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.2
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
NONE
Availability
LOW
Weakness Type (CWE)
Missing Authentication for Critical Function
EPSS
Base Score:
0.10