GHSA-RR4X-CRHF-8886
Vulnerability from github – Published: 2023-10-10 21:29 – Updated: 2025-02-20 22:50
VLAI?
Summary
Cache variables with the operations when transforms exist on the root level even if variables change in the further requests with the same operation
Details
When you have transforms on the root level or single source with transforms, and the client sends the same query with different variables, the initial variables are used in all following requests until the cache evicts DocumentNode.
Let's say if a token is sent via variables, the following requests will act like the same token is sent even if the following requests have different tokens.
This can cause a short memory leak but it won't grow per each request but per different operation until the cache evicts DocumentNode by LRU mechanism.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "@graphql-mesh/runtime"
},
"ranges": [
{
"events": [
{
"introduced": "0.96.5"
},
{
"fixed": "0.96.9"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-27097"
],
"database_specific": {
"cwe_ids": [
"CWE-400",
"CWE-401"
],
"github_reviewed": true,
"github_reviewed_at": "2023-10-10T21:29:50Z",
"nvd_published_at": "2025-02-20T21:15:26Z",
"severity": "MODERATE"
},
"details": "When you have transforms on the root level or single source with transforms, and the client sends the same query with different variables, the initial variables are used in all following requests until the cache evicts DocumentNode.\n\nLet\u0027s say if a token is sent via variables, the following requests will act like the same token is sent even if the following requests have different tokens.\n\nThis can cause a short memory leak but it won\u0027t grow per each request but per different operation until the cache evicts DocumentNode by LRU mechanism.",
"id": "GHSA-rr4x-crhf-8886",
"modified": "2025-02-20T22:50:52Z",
"published": "2023-10-10T21:29:50Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/Urigo/graphql-mesh/security/advisories/GHSA-rr4x-crhf-8886"
},
{
"type": "WEB",
"url": "https://github.com/ardatan/graphql-mesh/security/advisories/GHSA-rr4x-crhf-8886"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27097"
},
{
"type": "WEB",
"url": "https://github.com/Urigo/graphql-mesh/commit/482d813a9f75935024aa77872125d197f5fca3d0"
},
{
"type": "PACKAGE",
"url": "https://github.com/Urigo/graphql-mesh"
},
{
"type": "WEB",
"url": "https://github.com/Urigo/graphql-mesh/releases/tag/release-1696859949678"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Cache variables with the operations when transforms exist on the root level even if variables change in the further requests with the same operation"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…