Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31866: CWE-770: Allocation of Resources Without Limits or Throttling in open-feature flagd

0
High
VulnerabilityCVE-2026-31866cvecve-2026-31866cwe-770
Published: Wed Mar 11 2026 (03/11/2026, 17:49:48 UTC)
Source: CVE Database V5
Vendor/Project: open-feature
Product: flagd

Description

flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd exposes OFREP (/ofrep/v1/evaluate/...) and gRPC (evaluation.v1, evaluation.v2) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessible by client applications. The evaluation context included in request payloads is read into memory without any size restriction. An attacker can send a single HTTP request with an arbitrarily large body, causing flagd to allocate a corresponding amount of memory. This leads to immediate memory exhaustion and process termination (e.g., OOMKill in Kubernetes environments). flagd does not natively enforce authentication on its evaluation endpoints. While operators may deploy flagd behind an authenticating reverse proxy or similar infrastructure, the endpoints themselves impose no access control by default. This vulnerability is fixed in 0.14.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:15:11 UTC

Technical Analysis

The vulnerability identified as CVE-2026-31866 affects open-feature's flagd, a feature flag daemon used to evaluate feature flags via HTTP and gRPC endpoints. Prior to version 0.14.2, the evaluation endpoints (/ofrep/v1/evaluate/... and gRPC evaluation.v1, evaluation.v2) accept evaluation context data from client requests without imposing any size restrictions. This lack of input size validation allows an attacker to craft a single HTTP request with an arbitrarily large payload. When flagd processes this request, it attempts to allocate memory proportional to the payload size, leading to uncontrolled resource consumption. This can cause immediate memory exhaustion, resulting in the termination of the flagd process, often through an out-of-memory kill (OOMKill) mechanism, especially in containerized environments like Kubernetes. Notably, flagd does not natively enforce authentication or access control on these endpoints, meaning that unless operators deploy flagd behind an authenticating reverse proxy or similar infrastructure, the endpoints are publicly accessible and vulnerable to exploitation. The vulnerability is categorized under CWE-770 (Allocation of Resources Without Limits or Throttling). The CVSS v3.1 base score is 7.5 (high severity), reflecting network attack vector, no required privileges or user interaction, and a high impact on availability. No known exploits are currently reported in the wild. The issue is resolved in flagd version 0.14.2, which introduces protections against oversized payloads and presumably improved access controls.

Potential Impact

This vulnerability can lead to denial of service (DoS) by causing the flagd process to crash due to memory exhaustion. In environments where flagd is critical for feature flag evaluation, such as microservices architectures or continuous deployment pipelines, this can disrupt application behavior, degrade user experience, and potentially halt deployment workflows. In Kubernetes or other container orchestration platforms, OOMKills triggered by this vulnerability can cause pod restarts, increasing instability and resource consumption. Since flagd endpoints are often publicly accessible by design, attackers can exploit this remotely without authentication, amplifying the risk of widespread disruption. Organizations relying on flagd for feature management may face operational outages, increased incident response costs, and potential cascading failures in dependent systems. The absence of authentication by default further exacerbates exposure, especially if proper network segmentation or reverse proxies are not in place.

Mitigation Recommendations

The primary mitigation is to upgrade all deployments of flagd to version 0.14.2 or later, where this vulnerability is fixed. Until upgrades can be applied, organizations should implement strict network-level access controls to restrict access to flagd evaluation endpoints, such as placing flagd behind an authenticating reverse proxy or firewall rules limiting inbound traffic to trusted clients. Rate limiting and payload size restrictions should be enforced at the proxy or API gateway level to prevent oversized requests from reaching flagd. Monitoring memory usage and setting resource limits on containers running flagd can help detect and mitigate impact from attempted exploitation. Additionally, auditing deployment configurations to ensure flagd is not exposed directly to untrusted networks is critical. Security teams should also review logs for anomalous large requests to these endpoints and prepare incident response plans for potential DoS attacks. Finally, consider implementing application-layer authentication mechanisms if not already in place to reduce unauthorized access risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T19:02:25.013Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1b88b2f860ef9436021cb

Added to database: 3/11/2026, 6:46:35 PM

Last enriched: 3/18/2026, 7:15:11 PM

Last updated: 4/25/2026, 6:19:35 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses