Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31866: CWE-770: Allocation of Resources Without Limits or Throttling in open-feature flagd

0
High
VulnerabilityCVE-2026-31866cvecve-2026-31866cwe-770
Published: Wed Mar 11 2026 (03/11/2026, 17:49:48 UTC)
Source: CVE Database V5
Vendor/Project: open-feature
Product: flagd

Description

CVE-2026-31866 is a high-severity vulnerability in open-feature's flagd daemon versions prior to 0. 14. 2. The flaw arises from the lack of limits on the size of evaluation context data accepted via public HTTP and gRPC endpoints, allowing attackers to send arbitrarily large payloads. This causes flagd to allocate excessive memory, leading to immediate exhaustion and process termination, such as OOMKill in Kubernetes environments. The endpoints do not enforce authentication by default, increasing exposure risk if not protected by external controls. No known exploits are currently reported in the wild. The vulnerability is fixed in version 0. 14. 2.

AI-Powered Analysis

AILast updated: 03/11/2026, 18:50:34 UTC

Technical Analysis

The vulnerability identified as CVE-2026-31866 affects open-feature's flagd daemon, a feature flag evaluation service designed with a Unix philosophy and exposing HTTP (OFREP) and gRPC endpoints for client applications to evaluate feature flags. Prior to version 0.14.2, these endpoints accept evaluation context data in request payloads without any size restrictions. This lack of input size validation allows an attacker to send a single HTTP or gRPC request containing an arbitrarily large payload. Upon receiving such a request, flagd attempts to read the entire evaluation context into memory, causing uncontrolled memory allocation. This can rapidly exhaust available system memory, triggering process termination mechanisms such as the Linux OOM Killer, especially in containerized environments like Kubernetes. The endpoints themselves do not implement native authentication or access control, relying on operators to deploy flagd behind authenticating reverse proxies or similar infrastructure. This design choice increases the risk of exploitation if external protections are not properly configured. The vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling). The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, no required privileges or user interaction, and a high impact on availability. No known exploits have been reported in the wild as of the publication date. The issue is resolved in flagd version 0.14.2, which presumably adds input size validation or resource throttling to prevent memory exhaustion.

Potential Impact

The primary impact of CVE-2026-31866 is a denial-of-service (DoS) condition caused by memory exhaustion. Organizations running vulnerable versions of flagd risk service disruption when exposed to maliciously crafted requests with large payloads. In containerized or orchestrated environments like Kubernetes, this can lead to pod termination and potential cascading failures if flagd is a critical component in feature flag evaluation pipelines. The lack of native authentication on the evaluation endpoints means that any unauthenticated attacker with network access to flagd can exploit this vulnerability, increasing the attack surface. This may affect development, testing, and production environments where flagd is deployed without adequate network segmentation or access controls. While confidentiality and integrity are not directly impacted, the availability degradation can affect application behavior and user experience, especially in systems relying on feature flags for dynamic configuration and rollout. The absence of known exploits suggests limited active exploitation currently, but the ease of exploitation and high impact on availability make this a significant risk for organizations using flagd versions prior to 0.14.2.

Mitigation Recommendations

To mitigate CVE-2026-31866, organizations should immediately upgrade flagd to version 0.14.2 or later, which contains the fix for this vulnerability. Until the upgrade can be performed, operators should implement strict network-level access controls to restrict access to flagd's evaluation endpoints, ensuring only trusted clients can connect. Deploying flagd behind an authenticating reverse proxy or API gateway that enforces authentication and rate limiting is strongly recommended to prevent unauthenticated and abusive requests. Additionally, configuring resource limits and memory quotas at the container or orchestration level (e.g., Kubernetes pod resource limits) can help contain the impact of potential memory exhaustion. Monitoring flagd logs and metrics for unusually large or frequent evaluation requests can provide early detection of exploitation attempts. Finally, reviewing and applying security best practices for feature flag management, including isolating flagd instances from public networks and minimizing exposure, will reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T19:02:25.013Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1b88b2f860ef9436021cb

Added to database: 3/11/2026, 6:46:35 PM

Last enriched: 3/11/2026, 6:50:34 PM

Last updated: 3/11/2026, 7:47:12 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses