Cyber Posture

CVE-2026-40173

CriticalPublic PoC

Published: 15 April 2026

Published
15 April 2026
Modified
25 April 2026
KEV Added
Patch
CVSS Score 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
EPSS Score 0.0012 30.2th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered on the default mux and reachable without authentication, exposing the full process command line including the…

more

admin token configured via the --security "token=..." startup flag. An attacker can retrieve the leaked token and reuse it in the X-Dgraph-AuthToken header to gain unauthorized access to admin-only endpoints such as /admin/config/cache_mb, bypassing the adminAuthHandler token validation. This enables unauthorized privileged administrative access including configuration changes and operational control actions in any deployment where the Alpha HTTP port is reachable by untrusted parties. This issue has been fixed in version 25.3.2.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces authentication and access controls on endpoints like /debug/pprof/cmdline to prevent unauthenticated disclosure of admin tokens from the process command line.

prevent

Protects publicly accessible HTTP ports and endpoints in Dgraph Alpha from unauthorized access and sensitive credential exposure to untrusted parties.

prevent

Disables unnecessary debug endpoints such as /debug/pprof/cmdline to eliminate exposure of command line arguments containing admin tokens.

Security SummaryAI

CVE-2026-40173 is an unauthenticated credential disclosure vulnerability affecting Dgraph, an open source distributed GraphQL database, in versions 25.3.1 and prior. The issue stems from the /debug/pprof/cmdline endpoint being registered on the default mux and accessible without authentication, which exposes the full process command line. This includes the admin token configured via the --security "token=..." startup flag, enabling attackers to extract sensitive credentials directly.

Any unauthenticated attacker with network access to the Dgraph Alpha HTTP port can exploit this vulnerability. By querying the exposed endpoint, they retrieve the leaked admin token and reuse it in the X-Dgraph-AuthToken header to bypass the adminAuthHandler validation. This grants unauthorized access to admin-only endpoints, such as /admin/config/cache_mb, allowing privileged administrative actions like configuration changes and operational control in deployments exposed to untrusted parties. The CVSS v3.1 base score is 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L), with associated CWEs 200 (Exposure of Sensitive Information), 215 (Improper Handling of Credentials), and 522 (Insufficiently Protected Credentials).

The vulnerability has been fixed in Dgraph version 25.3.2, as detailed in the release notes at https://github.com/dgraph-io/dgraph/releases/tag/v25.3.2 and the security advisory at https://github.com/dgraph-io/dgraph/security/advisories/GHSA-95mq-xwj4-r47p. Security practitioners should upgrade to the patched version and review exposures of the Alpha HTTP port to mitigate risks.

Details

CWE(s)

Affected Products

dgraph
dgraph
≤ 25.3.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

Unauthenticated remote access to /debug/pprof/cmdline endpoint on public-facing HTTP service leaks admin token (T1190: Exploit Public-Facing Application; T1212: Exploitation for Credential Access).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References