NONE · 0

CVE-2026-5724

The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorizat...

Vulnerability Description

The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests without credentials. This endpoint is registered on the same port as WorkflowService and cannot be disabled independently. An attacker with network access to the frontend port could open the replication stream without authentication. Data exfiltration is possible, but  only when a configured replication target is correctly configured and the attacker has knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before returning replication data. Temporal Cloud is not affected.

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-5724?

CVE-2026-5724 is a documented vulnerability. The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorizat...

How severe is CVE-2026-5724?

CVSS scoring is not yet available for CVE-2026-5724. Check NVD for updates.

Is there a patch for CVE-2026-5724?

Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.