CVE-2025-64529: CWE-770: Allocation of Resources Without Limits or Throttling in authzed spicedb
SpiceDB is an open source database system for creating and managing security-critical application permissions. In versions prior to 1.45.2, users who use the exclusion operator somewhere in their authorization schema; have configured their SpiceDB server such that `--write-relationships-max-updates-per-call` is bigger than 6500; and issue calls to WriteRelationships with a large enough number of updates that cause the payload to be bigger than what their datastore allows; will receive a successful response from their `WriteRelationships` call, when in reality that call failed, and receive incorrect permission check results, if those relationships had to be read to resolve the relation involving the exclusion. Version 1.45.2 contains a patch for the issue. As a workaround, set `--write-relationships-max-updates-per-call` to `1000`.
AI Analysis
Technical Summary
CVE-2025-64529 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting authzed's SpiceDB, an open-source database designed for managing application permissions. The flaw exists in versions prior to 1.45.2 when users employ the exclusion operator in their authorization schema and configure the server with the `--write-relationships-max-updates-per-call` parameter set above 6500. Under these conditions, if a WriteRelationships API call includes a large number of updates causing the payload size to exceed datastore limits, the server erroneously returns a successful response even though the write operation fails internally. This discrepancy leads to incorrect permission check results, particularly when the failed relationships are involved in resolving relations with exclusions. The root cause is the lack of proper throttling or limits on resource allocation during write operations, causing the system to misreport the state of relationship writes. The vulnerability does not require authentication or user interaction, and the attack vector is network-based with low complexity. The issue was addressed in SpiceDB version 1.45.2 by implementing appropriate limits and error handling. As a temporary mitigation, reducing the `--write-relationships-max-updates-per-call` setting to 1000 limits the size of write operations, preventing the failure condition. No public exploits or active exploitation have been reported to date.
Potential Impact
For European organizations, this vulnerability could lead to incorrect permission enforcement in applications relying on SpiceDB for authorization management. Specifically, failed writes that are incorrectly reported as successful may cause the system to grant or deny access improperly, undermining the confidentiality and integrity of sensitive data. This could affect compliance with data protection regulations such as GDPR if unauthorized access occurs. Although the CVSS score is low, the impact on security-critical applications could be significant depending on how extensively the exclusion operator and large write operations are used. Availability is not directly impacted, but trust in the authorization system's correctness may be compromised. Organizations using SpiceDB in cloud-native or microservices environments where dynamic permission changes are frequent are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially if attackers discover ways to trigger the failure condition remotely.
Mitigation Recommendations
European organizations should upgrade all SpiceDB instances to version 1.45.2 or later to apply the official patch addressing this vulnerability. If immediate upgrade is not feasible, configure the server to set `--write-relationships-max-updates-per-call` to 1000 or lower to prevent oversized write operations that trigger the issue. Review authorization schemas to minimize or carefully audit the use of the exclusion operator, especially in conjunction with large batch writes. Implement monitoring and alerting on WriteRelationships API calls to detect anomalously large payloads or unexpected permission check results. Conduct thorough testing of permission enforcement after upgrades or configuration changes to ensure correctness. Additionally, limit network exposure of SpiceDB servers to trusted internal networks and enforce strict access controls to reduce attack surface. Maintain up-to-date backups and logs to facilitate incident response if incorrect permissions are detected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-64529: CWE-770: Allocation of Resources Without Limits or Throttling in authzed spicedb
Description
SpiceDB is an open source database system for creating and managing security-critical application permissions. In versions prior to 1.45.2, users who use the exclusion operator somewhere in their authorization schema; have configured their SpiceDB server such that `--write-relationships-max-updates-per-call` is bigger than 6500; and issue calls to WriteRelationships with a large enough number of updates that cause the payload to be bigger than what their datastore allows; will receive a successful response from their `WriteRelationships` call, when in reality that call failed, and receive incorrect permission check results, if those relationships had to be read to resolve the relation involving the exclusion. Version 1.45.2 contains a patch for the issue. As a workaround, set `--write-relationships-max-updates-per-call` to `1000`.
AI-Powered Analysis
Technical Analysis
CVE-2025-64529 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting authzed's SpiceDB, an open-source database designed for managing application permissions. The flaw exists in versions prior to 1.45.2 when users employ the exclusion operator in their authorization schema and configure the server with the `--write-relationships-max-updates-per-call` parameter set above 6500. Under these conditions, if a WriteRelationships API call includes a large number of updates causing the payload size to exceed datastore limits, the server erroneously returns a successful response even though the write operation fails internally. This discrepancy leads to incorrect permission check results, particularly when the failed relationships are involved in resolving relations with exclusions. The root cause is the lack of proper throttling or limits on resource allocation during write operations, causing the system to misreport the state of relationship writes. The vulnerability does not require authentication or user interaction, and the attack vector is network-based with low complexity. The issue was addressed in SpiceDB version 1.45.2 by implementing appropriate limits and error handling. As a temporary mitigation, reducing the `--write-relationships-max-updates-per-call` setting to 1000 limits the size of write operations, preventing the failure condition. No public exploits or active exploitation have been reported to date.
Potential Impact
For European organizations, this vulnerability could lead to incorrect permission enforcement in applications relying on SpiceDB for authorization management. Specifically, failed writes that are incorrectly reported as successful may cause the system to grant or deny access improperly, undermining the confidentiality and integrity of sensitive data. This could affect compliance with data protection regulations such as GDPR if unauthorized access occurs. Although the CVSS score is low, the impact on security-critical applications could be significant depending on how extensively the exclusion operator and large write operations are used. Availability is not directly impacted, but trust in the authorization system's correctness may be compromised. Organizations using SpiceDB in cloud-native or microservices environments where dynamic permission changes are frequent are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially if attackers discover ways to trigger the failure condition remotely.
Mitigation Recommendations
European organizations should upgrade all SpiceDB instances to version 1.45.2 or later to apply the official patch addressing this vulnerability. If immediate upgrade is not feasible, configure the server to set `--write-relationships-max-updates-per-call` to 1000 or lower to prevent oversized write operations that trigger the issue. Review authorization schemas to minimize or carefully audit the use of the exclusion operator, especially in conjunction with large batch writes. Implement monitoring and alerting on WriteRelationships API calls to detect anomalously large payloads or unexpected permission check results. Conduct thorough testing of permission enforcement after upgrades or configuration changes to ensure correctness. Additionally, limit network exposure of SpiceDB servers to trusted internal networks and enforce strict access controls to reduce attack surface. Maintain up-to-date backups and logs to facilitate incident response if incorrect permissions are detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-05T21:15:39.401Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691268886b3b7718db04cf00
Added to database: 11/10/2025, 10:34:48 PM
Last enriched: 11/10/2025, 10:49:51 PM
Last updated: 11/11/2025, 1:59:49 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-42940: CWE-787: Out-of-bounds Write in SAP_SE SAP CommonCryptoLib
HighCVE-2025-42924: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP S/4HANA landscape (SAP E-Recruiting BSP)
MediumCVE-2025-42919: CWE-22: Improper Limitation of a Pathname to a Restricted Directory in SAP_SE SAP NetWeaver Application Server Java
MediumCVE-2025-42899: CWE-862: Missing Authorization in SAP_SE SAP S4CORE (Manage Journal Entries)
MediumCVE-2025-42897: CWE-522: Insufficiently Protected Credentials in SAP_SE SAP Business One (SLD)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.