CVE-2026-40293
Wolfi vulnerability analysis and mitigation

OpenFGA is an authorization/permission engine built for developers. In versions 0.1.4 through 1.13.1, when OpenFGA is configured to use preshared-key authentication with the built-in playground enabled, the local server includes the preshared API key in the HTML response of the /playground endpoint. The /playground endpoint is enabled by default and does not require authentication. It is intended for local development and debugging and is not designed to be exposed to production environments. Only those who run OpenFGA with --authn-method preshared, with the playground enabled, and with the playground endpoint accessible beyond localhost or trusted networks are vulnerable. To remediate the issue, users should upgrade to OpenFGA v1.14.0, or disable the playground by running ./openfga run --playground-enabled=false.


SourceNVD

Related Wolfi vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-40611HIGH8.8
  • WolfiWolfi
  • github.com/go-acme/lego/v4
NoYesApr 16, 2026
CVE-2026-35469HIGH8.7
  • containerdcontainerd
  • k3s-1.35
NoYesApr 16, 2026
CVE-2026-40293MEDIUM6.5
  • WolfiWolfi
  • grafana-12.2
NoYesApr 17, 2026
CVE-2026-40347MEDIUM5.3
  • PythonPython
  • semgrep
NoYesApr 18, 2026
CVE-2026-6491MEDIUM4.8
  • WolfiWolfi
  • libvips
NoNoApr 17, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management