CVE-2025-64347
BaseFortify
Publication date: 2025-11-07
Last updated on: 2025-11-12
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apollographql | router | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Apollo Router Core allows unauthorized access to protected data. It occurs because the router does not enforce access control directives (@authenticated, @requiresScopes, and @policy) on schema elements that have been renamed via @link imports. As a result, queries can bypass element-level access controls, exposing data that should be protected.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to sensitive or protected data within the Apollo Router Core system. Attackers could exploit this to retrieve data they should not have access to, potentially leading to data breaches and exposure of confidential information.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Apollo Router Core to version 1.61.12 or 2.8.1 or later, as these versions include the fix that enforces access control directives properly and prevents unauthorized access through renamed schema elements.