Browse all 4 CVE security advisories affecting Temporal Technologies, Inc.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Temporal Technologies, Inc. develops workflow orchestration software enabling complex, distributed task automation across cloud environments. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and access control flaws. The company maintains four CVE records, with notable issues including authentication bypasses and insecure deserialization that could allow attackers to execute arbitrary code or compromise system integrity. While no major public security incidents have been documented, their CVE history suggests a pattern of vulnerabilities requiring timely patching to prevent potential exploitation in enterprise environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-5724 | Missing Authentication on Streaming gRPC Replication Endpoint — temporalCWE-306 | 5.9 | - | 2026-04-10 |
| CVE-2026-5199 | Cross Namespace Access via Batch Operation — temporalCWE-639 | 7.5AI | HighAI | 2026-04-01 |
| CVE-2025-1243 | Field in api-go proxy not transformed before version 1.44.1 — api-go libraryCWE-311 | 8.2 | - | 2025-02-12 |
| CVE-2024-2689 | Denial of Service if invalid UTF-8 sent — Temporal ServerCWE-20 | 4.4 | Medium | 2024-04-03 |
This page lists every published CVE security advisory associated with Temporal Technologies, Inc.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.