Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10550 | The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router's usage of Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. This could lead to excessive resource consumption and denial of service. Apollo Router's usage of Apollo Compiler has been updated so that validation logic processes each named fragment only once, preventing redundant traversal. This has been remediated in apollo-router versions 1.61.2 and 2.1.1. |
Github GHSA |
GHSA-3j43-9v8v-cp3f | Apollo Router Query Validation Vulnerable to Excessive Resource Consumption via Named Fragment Processing |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 09 Apr 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 09 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router's usage of Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. This could lead to excessive resource consumption and denial of service. Apollo Router's usage of Apollo Compiler has been updated so that validation logic processes each named fragment only once, preventing redundant traversal. This has been remediated in apollo-router versions 1.61.2 and 2.1.1. | |
| Title | Apollo Router Query Validation Vulnerable to Excessive Resource Consumption via Named Fragment Processing | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-09T20:43:06.645Z
Reserved: 2025-04-06T19:46:02.462Z
Link: CVE-2025-32380
Updated: 2025-04-09T17:28:37.712Z
Status : Awaiting Analysis
Published: 2025-04-09T16:15:26.053
Modified: 2025-04-09T20:02:41.860
Link: CVE-2025-32380
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA