CVE-2025-64347
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-07

Last updated on: 2025-11-12

Assigner: GitHub, Inc.

Description
Apollo Router Core is a configurable Rust graph router written to run a federated supergraph using Apollo Federation 2. Versions 1.61.12-rc.0 and below and 2.8.1-rc.0 allow unauthorized access to protected data through schema elements with access control directives (@authenticated, @requiresScopes, and @policy) that were renamed via @link imports. Router did not enforce renamed access control directives on schema elements (e.g. fields and types), allowing queries to bypass those element-level access controls. This issue is fixed in versions 1.61.12 and 2.8.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-07
Last Modified
2025-11-12
Generated
2026-05-07
AI Q&A
2025-11-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apollographql router *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Apollo Router Core allows unauthorized access to protected data. It occurs because the router does not enforce access control directives (@authenticated, @requiresScopes, and @policy) on schema elements that have been renamed via @link imports. As a result, queries can bypass element-level access controls, exposing data that should be protected.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to sensitive or protected data within the Apollo Router Core system. Attackers could exploit this to retrieve data they should not have access to, potentially leading to data breaches and exposure of confidential information.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Apollo Router Core to version 1.61.12 or 2.8.1 or later, as these versions include the fix that enforces access control directives properly and prevents unauthorized access through renamed schema elements.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart