Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1664: CWE-639 Authorization Bypass Through User-Controlled Key

0
Medium
VulnerabilityCVE-2026-1664cvecve-2026-1664cwe-639
Published: Tue Feb 03 2026 (02/03/2026, 11:39:18 UTC)
Source: CVE Database V5

Description

Summary An Insecure Direct Object Reference has been found to exist in `createHeaderBasedEmailResolver()` function within the Cloudflare Agents SDK. The issue occurs because the `Message-ID` and `References` headers are parsed to derive the target agentName and agentId without proper validation or origin checks, allowing an external attacker with control of these headers to route inbound mail to arbitrary Durable Object instances and namespaces . Root cause The `createHeaderBasedEmailResolver()` function lacks cryptographic verification or origin validation for the headers used in the routing logic, effectively allowing external input to dictate internal object routing. Impact Insecure Direct Object Reference (IDOR) in email routing lets an attacker steer inbound mail to arbitrary Agent instances via spoofed Message-ID. Mitigation: * PR: https://github.com/cloudflare/agents/blob/main/docs/email.md ] provides the necessary architectural context for coding agents to mitigate the issue by refactoring the resolver to enforce strict identity boundaries. * Agents-sdk users should upgrade to agents@0.3.7

AI-Powered Analysis

AILast updated: 02/03/2026, 12:14:26 UTC

Technical Analysis

CVE-2026-1664 is a medium-severity vulnerability classified as CWE-639: Authorization Bypass Through User-Controlled Key, found in the Cloudflare Agents SDK version 0.0.104. The vulnerability exists in the createHeaderBasedEmailResolver() function, which is responsible for routing inbound emails to specific Durable Object instances based on the Message-ID and References headers. These headers are parsed without cryptographic verification or origin validation, allowing an attacker to craft spoofed email headers that manipulate the routing logic. This results in an Insecure Direct Object Reference (IDOR) where an attacker can redirect inbound mail to arbitrary agentName and agentId Durable Object instances and namespaces. Since the routing decision is based on untrusted external input, attackers can bypass intended authorization boundaries and potentially intercept, redirect, or disrupt email processing workflows. The vulnerability does not require authentication or user interaction, increasing its exploitability. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N) indicates network attack vector, low complexity, no privileges or user interaction needed, with low impact on confidentiality and integrity and no impact on availability. Cloudflare has provided mitigation guidance through architectural refactoring to enforce strict identity boundaries and recommends upgrading to agents@0.3.7, which addresses the issue by implementing proper validation and origin checks on the headers used for routing.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of inbound email processing when using the affected Cloudflare Agents SDK version 0.0.104. Attackers can exploit the flaw to reroute emails to unauthorized Durable Object instances, potentially enabling interception or manipulation of sensitive communications. This could lead to data leakage, unauthorized access to internal email workflows, or disruption of email-based automation and agent processing. Organizations relying on Cloudflare's Durable Objects for email routing, especially in sectors like finance, government, and critical infrastructure, may face increased risk of targeted attacks. The lack of authentication and user interaction requirements means that exploitation can be automated and performed remotely over the network, increasing the threat surface. While no known exploits are currently reported in the wild, the medium severity rating and ease of exploitation warrant prompt attention. Failure to mitigate could result in reputational damage, regulatory non-compliance (e.g., GDPR breaches due to unauthorized data access), and operational disruptions.

Mitigation Recommendations

European organizations using Cloudflare Agents SDK version 0.0.104 should immediately upgrade to version agents@0.3.7, which includes fixes for this vulnerability. Beyond upgrading, developers should refactor their email routing logic to enforce strict identity boundaries, ensuring that routing decisions are based on cryptographically verified or origin-validated headers rather than untrusted external input. Implementing cryptographic signatures or token-based validation on email headers can prevent spoofing. Additionally, organizations should audit their use of Durable Objects in email processing to identify any unauthorized routing paths. Monitoring inbound email traffic for anomalous Message-ID or References header patterns can help detect exploitation attempts. Incorporating network-level protections such as email gateway filtering, SPF, DKIM, and DMARC enforcement will reduce the risk of header spoofing. Finally, organizations should review and update incident response plans to include scenarios involving email routing manipulation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cloudflare
Date Reserved
2026-01-29T21:09:21.411Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6981e349f9fa50a62fc25650

Added to database: 2/3/2026, 12:00:09 PM

Last enriched: 2/3/2026, 12:14:26 PM

Last updated: 2/3/2026, 4:29:34 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats