### [CVE-2024-8260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8260) ![](https://img.shields.io/static/v1?label=Product&message=OPA&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%20v0.68.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-294%20Authentication%20Bypass%20by%20Capture-replay&color=brighgreen) ### Description A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds