Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64529: CWE-770: Allocation of Resources Without Limits or Throttling in authzed spicedb

0
Low
VulnerabilityCVE-2025-64529cvecve-2025-64529cwe-770
Published: Mon Nov 10 2025 (11/10/2025, 22:28:51 UTC)
Source: CVE Database V5
Vendor/Project: authzed
Product: spicedb

Description

SpiceDB is an open source database system for creating and managing security-critical application permissions. In versions prior to 1.45.2, users who use the exclusion operator somewhere in their authorization schema; have configured their SpiceDB server such that `--write-relationships-max-updates-per-call` is bigger than 6500; and issue calls to WriteRelationships with a large enough number of updates that cause the payload to be bigger than what their datastore allows; will receive a successful response from their `WriteRelationships` call, when in reality that call failed, and receive incorrect permission check results, if those relationships had to be read to resolve the relation involving the exclusion. Version 1.45.2 contains a patch for the issue. As a workaround, set `--write-relationships-max-updates-per-call` to `1000`.

AI-Powered Analysis

AILast updated: 11/10/2025, 22:49:51 UTC

Technical Analysis

CVE-2025-64529 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting authzed's SpiceDB, an open-source database designed for managing application permissions. The flaw exists in versions prior to 1.45.2 when users employ the exclusion operator in their authorization schema and configure the server with the `--write-relationships-max-updates-per-call` parameter set above 6500. Under these conditions, if a WriteRelationships API call includes a large number of updates causing the payload size to exceed datastore limits, the server erroneously returns a successful response even though the write operation fails internally. This discrepancy leads to incorrect permission check results, particularly when the failed relationships are involved in resolving relations with exclusions. The root cause is the lack of proper throttling or limits on resource allocation during write operations, causing the system to misreport the state of relationship writes. The vulnerability does not require authentication or user interaction, and the attack vector is network-based with low complexity. The issue was addressed in SpiceDB version 1.45.2 by implementing appropriate limits and error handling. As a temporary mitigation, reducing the `--write-relationships-max-updates-per-call` setting to 1000 limits the size of write operations, preventing the failure condition. No public exploits or active exploitation have been reported to date.

Potential Impact

For European organizations, this vulnerability could lead to incorrect permission enforcement in applications relying on SpiceDB for authorization management. Specifically, failed writes that are incorrectly reported as successful may cause the system to grant or deny access improperly, undermining the confidentiality and integrity of sensitive data. This could affect compliance with data protection regulations such as GDPR if unauthorized access occurs. Although the CVSS score is low, the impact on security-critical applications could be significant depending on how extensively the exclusion operator and large write operations are used. Availability is not directly impacted, but trust in the authorization system's correctness may be compromised. Organizations using SpiceDB in cloud-native or microservices environments where dynamic permission changes are frequent are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially if attackers discover ways to trigger the failure condition remotely.

Mitigation Recommendations

European organizations should upgrade all SpiceDB instances to version 1.45.2 or later to apply the official patch addressing this vulnerability. If immediate upgrade is not feasible, configure the server to set `--write-relationships-max-updates-per-call` to 1000 or lower to prevent oversized write operations that trigger the issue. Review authorization schemas to minimize or carefully audit the use of the exclusion operator, especially in conjunction with large batch writes. Implement monitoring and alerting on WriteRelationships API calls to detect anomalously large payloads or unexpected permission check results. Conduct thorough testing of permission enforcement after upgrades or configuration changes to ensure correctness. Additionally, limit network exposure of SpiceDB servers to trusted internal networks and enforce strict access controls to reduce attack surface. Maintain up-to-date backups and logs to facilitate incident response if incorrect permissions are detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T21:15:39.401Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691268886b3b7718db04cf00

Added to database: 11/10/2025, 10:34:48 PM

Last enriched: 11/10/2025, 10:49:51 PM

Last updated: 11/11/2025, 1:59:49 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats