Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-5724— Missing Authentication on Streaming gRPC Replication Endpoint

EPSS 0.06% · P19
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-5724

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Missing Authentication on Streaming gRPC Replication Endpoint
Source: NVD (National Vulnerability Database)
Vulnerability Description
The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests without credentials. This endpoint is registered on the same port as WorkflowService and cannot be disabled independently. An attacker with network access to the frontend port could open the replication stream without authentication. Data exfiltration is possible, but  only when a configured replication target is correctly configured and the attacker has knowledge of the cluster configuration, as the history service validates cluster IDs and peer membership before returning replication data. Temporal Cloud is not affected.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Temporal 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Temporal是temporal.io开源的一个持久化执行平台。 temporal存在安全漏洞,该漏洞源于前端gRPC服务器的流式拦截器链未包含授权拦截器,导致配置ClaimMapper和Authorizer时,流式AdminService/StreamWorkflowReplicationMessages端点接受无凭据请求,可能允许具有网络访问权限的攻击者未经身份验证打开复制流,可能导致数据渗漏。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Temporal Technologies, Inc.temporal 1.24.0 ~ 1.30.3 -

II. Public POCs for CVE-2026-5724

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-5724

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-5724

No comments yet


Leave a comment