OpenSearch has a bypass of REST Layer Authorization Using Malformed Paths
Low severity
GitHub Reviewed
Published
Apr 30, 2026
in
opensearch-project/security
•
Updated May 7, 2026
Package
Affected versions
>= 2.11.0.0, < 2.19.0.0
Patched versions
2.19.0.0
Description
Published to the GitHub Advisory Database
May 7, 2026
Reviewed
May 7, 2026
Last updated
May 7, 2026
Description
A flaw was identified in the OpenSearch REST layer that could allow authorization checks to be bypassed when processing certain malformed HTTP requests. This could permit unauthorized access to restricted API endpoints in environments that rely on REST-layer authorization.
Transport-level authorization is not affected by this issue.
Impact
The default OpenSearch distribution is not affected by this issue. REST actions in the default distribution have corresponding transport actions that independently enforce authorization. Custom plugins that register REST actions without a corresponding transport action may be affected, potentially allowing unauthorized read access to those endpoints.
Patches
This issue is fixed in OpenSearch 2.19.0. Users should upgrade to 2.19.0 or later.
References