CVE-2026-40173
Published: 15 April 2026
Description
Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered on the default mux and reachable without authentication, exposing the full process command line including the…
more
admin token configured via the --security "token=..." startup flag. An attacker can retrieve the leaked token and reuse it in the X-Dgraph-AuthToken header to gain unauthorized access to admin-only endpoints such as /admin/config/cache_mb, bypassing the adminAuthHandler token validation. This enables unauthorized privileged administrative access including configuration changes and operational control actions in any deployment where the Alpha HTTP port is reachable by untrusted parties. This issue has been fixed in version 25.3.2.
Mitigating Controls (NIST 800-53 r5)AI
Enforces authentication and access controls on endpoints like /debug/pprof/cmdline to prevent unauthenticated disclosure of admin tokens from the process command line.
Protects publicly accessible HTTP ports and endpoints in Dgraph Alpha from unauthorized access and sensitive credential exposure to untrusted parties.
Disables unnecessary debug endpoints such as /debug/pprof/cmdline to eliminate exposure of command line arguments containing admin tokens.
Security SummaryAI
CVE-2026-40173 is an unauthenticated credential disclosure vulnerability affecting Dgraph, an open source distributed GraphQL database, in versions 25.3.1 and prior. The issue stems from the /debug/pprof/cmdline endpoint being registered on the default mux and accessible without authentication, which exposes the full process command line. This includes the admin token configured via the --security "token=..." startup flag, enabling attackers to extract sensitive credentials directly.
Any unauthenticated attacker with network access to the Dgraph Alpha HTTP port can exploit this vulnerability. By querying the exposed endpoint, they retrieve the leaked admin token and reuse it in the X-Dgraph-AuthToken header to bypass the adminAuthHandler validation. This grants unauthorized access to admin-only endpoints, such as /admin/config/cache_mb, allowing privileged administrative actions like configuration changes and operational control in deployments exposed to untrusted parties. The CVSS v3.1 base score is 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L), with associated CWEs 200 (Exposure of Sensitive Information), 215 (Improper Handling of Credentials), and 522 (Insufficiently Protected Credentials).
The vulnerability has been fixed in Dgraph version 25.3.2, as detailed in the release notes at https://github.com/dgraph-io/dgraph/releases/tag/v25.3.2 and the security advisory at https://github.com/dgraph-io/dgraph/security/advisories/GHSA-95mq-xwj4-r47p. Security practitioners should upgrade to the patched version and review exposures of the Alpha HTTP port to mitigate risks.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote access to /debug/pprof/cmdline endpoint on public-facing HTTP service leaks admin token (T1190: Exploit Public-Facing Application; T1212: Exploitation for Credential Access).