{"vulnerability": "cve-2025-27098", "sightings": [{"uuid": "c2deba69-610b-4678-8755-6d595c9248ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27098", "type": "seen", "source": "https://t.me/cvedetector/18598", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27098 - GraphQL Mesh File System Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27098 \nPublished : Feb. 20, 2025, 9:15 p.m. | 23\u00a0minutes ago \nDescription : GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. Missing check vulnerability in the static file handler allows any client to access the files in the server's file system. When `staticFiles` is set in the `serve` settings in the configuration file, the following handler doesn't check if `absolutePath` is still under the directory provided as `staticFiles`. Users have two options to fix vulnerability; 1. Update `@graphql-mesh/cli` to a version higher than `0.82.21`, and if you use `@graphql-mesh/http`, update it to a version higher than `0.3.18` 2. Remove `staticFiles` option from the configuration, and use other solutions to serve static files. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T23:12:03.000000Z"}, {"uuid": "921d35e1-c970-498a-8d4a-f9cd859a29a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27098", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4811", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27098\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. Missing check vulnerability in the static file handler allows any client to access the files in the server's file system. When `staticFiles` is set in the `serve` settings in the configuration file, the following handler doesn't check if `absolutePath` is still under the directory provided as `staticFiles`. Users have two options to fix vulnerability; 1. Update `@graphql-mesh/cli` to a version higher than `0.82.21`, and if you use `@graphql-mesh/http`, update it to a version higher than `0.3.18` 2. Remove `staticFiles` option from the configuration, and use other solutions to serve static files.\n\ud83d\udccf Published: 2025-02-20T20:13:01.242Z\n\ud83d\udccf Modified: 2025-02-20T21:04:05.183Z\n\ud83d\udd17 References:\n1. https://github.com/ardatan/graphql-mesh/security/advisories/GHSA-j2wh-wrv3-4x4g", "creation_timestamp": "2025-02-20T21:17:42.000000Z"}]}