Description

flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd exposes OFREP (/ofrep/v1/evaluate/...) and gRPC (evaluation.v1, evaluation.v2) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessible by client applications. The evaluation context included in request payloads is read into memory without any size restriction. An attacker can send a single HTTP request with an arbitrarily large body, causing flagd to allocate a corresponding amount of memory. This leads to immediate memory exhaustion and process termination (e.g., OOMKill in Kubernetes environments). flagd does not natively enforce authentication on its evaluation endpoints. While operators may deploy flagd behind an authenticating reverse proxy or similar infrastructure, the endpoints themselves impose no access control by default. This vulnerability is fixed in 0.14.2.

INFO

Published Date :

2026-03-11T17:49:48.520Z

Last Modified :

2026-03-12T13:50:21.906Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-31866 vulnerability.

Vendors Products
Open-feature
  • Flagd
Openfeature
  • Flagd
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-31866.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact