Cyber Posture

CVE-2025-27097

High

Published: 20 February 2025

Published
20 February 2025
Modified
27 February 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0041 61.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.

Security Summary

CVE-2025-27097 is a vulnerability in GraphQL Mesh, an open-source GraphQL Federation framework and gateway that supports GraphQL Federation and non-GraphQL subgraphs, including REST, gRPC services, and databases like MongoDB, MySQL, and PostgreSQL. The issue arises when users apply transforms at the root level or to a single source, causing the cache to retain initial variables for subsequent identical queries with different variables until the DocumentNode is evicted by the LRU mechanism. This results in later requests reusing the initial variables—such as authentication tokens—regardless of new values provided, alongside a bounded memory leak that grows per unique operation rather than per request. The vulnerability is rated 7.5 on the CVSS 3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-400 (Uncontrolled Resource Consumption) and CWE-401 (Memory Leak).

Any unauthenticated remote attacker with network access can exploit this vulnerability by sending repeated queries with varying variables, such as different authentication tokens, against an affected GraphQL Mesh instance configured with the specified transforms. This forces the cache to apply the initial variables across requests, potentially leading to incorrect token handling and a denial-of-service condition through gradual memory consumption, as the leak accumulates based on distinct operations until LRU eviction occurs.

The official security advisory, published on GitHub at https://github.com/ardatan/graphql-mesh/security/advisories/GHSA-rr4x-crhf-8886, provides details on mitigation steps for this vulnerability. Security practitioners should consult this advisory for patching instructions, workarounds, and affected versions of GraphQL Mesh.

Details

CWE(s)
CWE-400CWE-401

Affected Products

the-guild
graphql mesh
0.96.5, 0.96.6, 0.96.7, 0.96.8

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499 Endpoint Denial of Service Impact
Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.
Why these techniques?

Remote unauthenticated exploitation of public-facing GraphQL service enables T1190; memory leak via repeated queries with varying variables directly facilitates T1499 endpoint DoS through resource exhaustion.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References