GraphQL Modules is a toolset of libraries and guidelines dedicated to create reusable, maintainable, testable and extendable modules out of your GraphQL server. From 2.2.1 to before 2.4.1 and 3.1.1, when 2 or more parallel requests are made which trigger the same service, the context of the requests is mixed up in the service when the context is injected via @ExecutionContext(). ExecutionContext is often used to pass authentication tokens from incoming requests to services loading data from backend APIs. This vulnerability is fixed in 2.4.1 and 3.1.1.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-53wg-r69p-v3r7 GraphQL Modules has a Race Condition issue
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 16 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Description GraphQL Modules is a toolset of libraries and guidelines dedicated to create reusable, maintainable, testable and extendable modules out of your GraphQL server. From 2.2.1 to before 2.4.1 and 3.1.1, when 2 or more parallel requests are made which trigger the same service, the context of the requests is mixed up in the service when the context is injected via @ExecutionContext(). ExecutionContext is often used to pass authentication tokens from incoming requests to services loading data from backend APIs. This vulnerability is fixed in 2.4.1 and 3.1.1.
Title Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in graphql-modules
Weaknesses CWE-362
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-16T20:28:19.571Z

Reserved: 2026-01-15T15:45:01.957Z

Link: CVE-2026-23735

cve-icon Vulnrichment

Updated: 2026-01-16T20:28:11.535Z

cve-icon NVD

Status : Received

Published: 2026-01-16T20:15:51.473

Modified: 2026-01-16T20:15:51.473

Link: CVE-2026-23735

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses