CVE-2025-32031:
Apollo Gateway Query Planner Vulnerable to Excessive Resource Consumption via Optimization Bypass
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.17582%
CWE
Published
4/7/2025
Updated
4/8/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@apollo/gateway | npm | < 2.10.1 | 2.10.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in query planning functions that process
() nested fragments without resource limits. Key evidence comes from: 1) The QueryPlanner.buildQueryPlan
modifications adding nonLocalSelectionsState
checks 2) FragmentSpreadSelection
being made public with associated validation
added 3) QueryGraph.build
gaining security flags 4) Planning functions like computeRootParallelBestPlan
adding limit parameters. Pre-patch versions of these functions lacked the nonLocalSelectionsMetadata
initialization and recursive selection validation
shown in the patches, allowing unbounded computation through recursive fragment processing
and cross-subgraph edge evaluation.