Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64529: CWE-770: Allocation of Resources Without Limits or Throttling in authzed spicedb

0
Low
VulnerabilityCVE-2025-64529cvecve-2025-64529cwe-770
Published: Mon Nov 10 2025 (11/10/2025, 22:28:51 UTC)
Source: CVE Database V5
Vendor/Project: authzed
Product: spicedb

Description

SpiceDB is an open source database system for creating and managing security-critical application permissions. In versions prior to 1.45.2, users who use the exclusion operator somewhere in their authorization schema; have configured their SpiceDB server such that `--write-relationships-max-updates-per-call` is bigger than 6500; and issue calls to WriteRelationships with a large enough number of updates that cause the payload to be bigger than what their datastore allows; will receive a successful response from their `WriteRelationships` call, when in reality that call failed, and receive incorrect permission check results, if those relationships had to be read to resolve the relation involving the exclusion. Version 1.45.2 contains a patch for the issue. As a workaround, set `--write-relationships-max-updates-per-call` to `1000`.

AI-Powered Analysis

AILast updated: 11/17/2025, 23:08:04 UTC

Technical Analysis

CVE-2025-64529 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting authzed's SpiceDB, an open-source database system designed for managing application permissions securely. The flaw exists in versions prior to 1.45.2 and is triggered when users employ the exclusion operator in their authorization schema and configure the server with a `--write-relationships-max-updates-per-call` value exceeding 6500. Under these conditions, if a WriteRelationships API call includes a large number of updates resulting in a payload size exceeding datastore limits, the server incorrectly returns a successful response even though the operation failed internally. This discrepancy causes the permission checks that rely on these relationships, especially those involving exclusions, to yield incorrect results. The root cause is the lack of proper throttling or limits on resource allocation during large update operations, leading to silent failures. The vulnerability does not require authentication or user interaction, and no known exploits are currently reported in the wild. The issue was addressed in SpiceDB version 1.45.2 by implementing proper limits and error handling. As a temporary mitigation, users can set the `--write-relationships-max-updates-per-call` parameter to 1000 to avoid triggering the bug. The CVSS 4.0 score of 2.7 reflects a low severity, primarily due to the limited impact scope and the absence of remote code execution or privilege escalation. However, the incorrect permission evaluation can undermine the integrity of access control decisions in applications relying on SpiceDB.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential for incorrect permission checks, which can lead to unauthorized access or denial of legitimate access to sensitive resources. Organizations using SpiceDB to enforce fine-grained, security-critical permissions in applications such as financial services, healthcare, or government systems may face risks of data exposure or operational disruption. Although the vulnerability does not directly allow attackers to execute arbitrary code or escalate privileges, the integrity of authorization decisions is compromised, which can undermine trust in security controls. The silent failure of WriteRelationships calls can also complicate incident detection and response, as administrators may believe updates succeeded when they did not. This can affect compliance with data protection regulations like GDPR if unauthorized data access occurs. The low CVSS score suggests limited immediate risk, but the impact is context-dependent, particularly for organizations with complex authorization schemas using the exclusion operator and large-scale relationship updates. The absence of known exploits reduces urgency but does not eliminate risk, especially as attackers may develop techniques to exploit this flaw over time.

Mitigation Recommendations

European organizations should upgrade SpiceDB to version 1.45.2 or later, where the vulnerability is patched. Until upgrading is feasible, they should configure the `--write-relationships-max-updates-per-call` parameter to 1000 or lower to prevent triggering the issue. It is critical to audit authorization schemas for the use of the exclusion operator and review the size and frequency of WriteRelationships API calls to avoid large payloads that exceed datastore limits. Implement monitoring and alerting on WriteRelationships call failures and permission check anomalies to detect potential exploitation or misconfigurations. Additionally, organizations should conduct thorough testing of permission evaluations after applying updates or configuration changes to ensure correctness. Where possible, segment and isolate systems using SpiceDB to limit the blast radius of incorrect permission evaluations. Finally, maintain an inventory of affected systems and ensure that security teams are aware of the vulnerability and mitigation steps.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T21:15:39.401Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691268886b3b7718db04cf00

Added to database: 11/10/2025, 10:34:48 PM

Last enriched: 11/17/2025, 11:08:04 PM

Last updated: 12/24/2025, 3:41:39 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats