CVE-2025-65111: CWE-277: Insecure Inherited Permissions in authzed spicedb
SpiceDB is an open source database system for creating and managing security-critical application permissions. Prior to version 1.47.1, if a schema includes the following characteristics: permission defined in terms of a union (+) and that union references the same relation on both sides (but one side arrows to a different permission). Then SpiceDB may have missing LookupResources results when checking the permission. This only affects LookupResources; other APIs calculate permissionship correctly. The issue is fixed in version 1.47.1.
AI Analysis
Technical Summary
CVE-2025-65111 identifies a vulnerability in SpiceDB, an open-source database designed for managing application permissions securely. The issue arises when a schema defines a permission using a union (+) operation that references the same relation on both sides but points to different permissions. Under these conditions, the LookupResources API, responsible for enumerating resources accessible under a given permission, may return incomplete results. This means that some resources that should be accessible might not be listed, potentially causing authorization failures or inconsistent access control behavior. Importantly, other APIs within SpiceDB that calculate permissionship are unaffected and continue to operate correctly. The vulnerability stems from insecure inherited permissions, categorized under CWE-277, indicating improper permission validation or enforcement. The flaw is present in versions prior to 1.47.1 and has been addressed in that release. The CVSS 4.0 base score is 2.9, reflecting a low severity due to the limited impact on confidentiality and availability, no requirement for privileges or user interaction, and the fact that it only affects a specific API call. No exploits have been observed in the wild, suggesting limited active threat. However, organizations relying on LookupResources for critical permission checks may experience incomplete permission enforcement, potentially leading to security policy inconsistencies or operational issues.
Potential Impact
For European organizations, the impact of this vulnerability depends on their use of SpiceDB in managing application permissions, especially in security-critical environments. Incomplete LookupResources results could cause applications to deny legitimate access to resources or, conversely, fail to detect unauthorized access if the application logic relies solely on this API for permission enumeration. This inconsistency can disrupt business operations, cause user frustration, and potentially expose sensitive data if compensating controls are not in place. Organizations using SpiceDB in cloud-native or microservices architectures, common in Europe’s technology sectors, may face challenges in maintaining consistent access control policies. While the vulnerability does not directly lead to privilege escalation or data breaches, the risk of authorization errors can undermine trust in security mechanisms. Given the low severity and absence of known exploits, the immediate threat is limited, but the operational impact could be significant in environments with complex permission schemas. European entities with compliance obligations around access control (e.g., GDPR) should consider the implications of incomplete permission enforcement on data protection and auditability.
Mitigation Recommendations
The primary mitigation is to upgrade SpiceDB to version 1.47.1 or later, where the vulnerability is fixed. Organizations should audit their permission schemas to identify any use of unions referencing the same relation with different permissions, as this pattern triggers the issue. Where upgrading is not immediately feasible, implement compensating controls such as additional permission validation layers outside of SpiceDB or avoid relying solely on the LookupResources API for critical authorization decisions. Conduct thorough testing of permission checks after schema changes to detect inconsistencies. Monitoring and logging access control decisions can help identify anomalies caused by incomplete permission lookups. Security teams should also review application logic to ensure fallback mechanisms exist if LookupResources returns incomplete data. Finally, maintain awareness of SpiceDB updates and security advisories to promptly address future vulnerabilities.
Affected Countries
Germany, Netherlands, United Kingdom, France, Sweden
CVE-2025-65111: CWE-277: Insecure Inherited Permissions in authzed spicedb
Description
SpiceDB is an open source database system for creating and managing security-critical application permissions. Prior to version 1.47.1, if a schema includes the following characteristics: permission defined in terms of a union (+) and that union references the same relation on both sides (but one side arrows to a different permission). Then SpiceDB may have missing LookupResources results when checking the permission. This only affects LookupResources; other APIs calculate permissionship correctly. The issue is fixed in version 1.47.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-65111 identifies a vulnerability in SpiceDB, an open-source database designed for managing application permissions securely. The issue arises when a schema defines a permission using a union (+) operation that references the same relation on both sides but points to different permissions. Under these conditions, the LookupResources API, responsible for enumerating resources accessible under a given permission, may return incomplete results. This means that some resources that should be accessible might not be listed, potentially causing authorization failures or inconsistent access control behavior. Importantly, other APIs within SpiceDB that calculate permissionship are unaffected and continue to operate correctly. The vulnerability stems from insecure inherited permissions, categorized under CWE-277, indicating improper permission validation or enforcement. The flaw is present in versions prior to 1.47.1 and has been addressed in that release. The CVSS 4.0 base score is 2.9, reflecting a low severity due to the limited impact on confidentiality and availability, no requirement for privileges or user interaction, and the fact that it only affects a specific API call. No exploits have been observed in the wild, suggesting limited active threat. However, organizations relying on LookupResources for critical permission checks may experience incomplete permission enforcement, potentially leading to security policy inconsistencies or operational issues.
Potential Impact
For European organizations, the impact of this vulnerability depends on their use of SpiceDB in managing application permissions, especially in security-critical environments. Incomplete LookupResources results could cause applications to deny legitimate access to resources or, conversely, fail to detect unauthorized access if the application logic relies solely on this API for permission enumeration. This inconsistency can disrupt business operations, cause user frustration, and potentially expose sensitive data if compensating controls are not in place. Organizations using SpiceDB in cloud-native or microservices architectures, common in Europe’s technology sectors, may face challenges in maintaining consistent access control policies. While the vulnerability does not directly lead to privilege escalation or data breaches, the risk of authorization errors can undermine trust in security mechanisms. Given the low severity and absence of known exploits, the immediate threat is limited, but the operational impact could be significant in environments with complex permission schemas. European entities with compliance obligations around access control (e.g., GDPR) should consider the implications of incomplete permission enforcement on data protection and auditability.
Mitigation Recommendations
The primary mitigation is to upgrade SpiceDB to version 1.47.1 or later, where the vulnerability is fixed. Organizations should audit their permission schemas to identify any use of unions referencing the same relation with different permissions, as this pattern triggers the issue. Where upgrading is not immediately feasible, implement compensating controls such as additional permission validation layers outside of SpiceDB or avoid relying solely on the LookupResources API for critical authorization decisions. Conduct thorough testing of permission checks after schema changes to detect inconsistencies. Monitoring and logging access control decisions can help identify anomalies caused by incomplete permission lookups. Security teams should also review application logic to ensure fallback mechanisms exist if LookupResources returns incomplete data. Finally, maintain awareness of SpiceDB updates and security advisories to promptly address future vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-17T20:55:34.694Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6920e4b727835fd566e3a362
Added to database: 11/21/2025, 10:16:23 PM
Last enriched: 11/21/2025, 10:31:20 PM
Last updated: 11/22/2025, 12:43:06 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighCVE-2025-12678
UnknownCVE-2025-11933: CWE-20 Improper Input Validation in wofSSL wolfSSL
LowCVE-2025-65108: CWE-94: Improper Control of Generation of Code ('Code Injection') in simonhaenisch md-to-pdf
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.