Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. apollo-router
  4. ›
  5. GHSA-hff2-gcpx-8f4p

GHSA-hff2-gcpx-8f4p: Apollo Router Core: Browser Bug Enables Bypass of XS-Search Prevention via Read-Only Cross-Site Request Forgery

March 26, 2026

In a Cross-Site Request Forgery attack, untrusted web content causes browsers to send authenticated requests to web servers which use cookies for authentication. While the web content is prevented from reading the request’s response due to the Cross-Origin Request Sharing (CORS) protocol, the attacker may be able to cause side effects in the server (“CSRF” attack), or learn something about the response via timing analysis (“XS-Search” attack).

Apollo Router has a built-in feature which prevents CSRF and XS-Search attacks: it refuses to process GraphQL requests that could possibly have been sent by a spec-compliant web browser without a protective “preflight” step. See Apollo Router’s docs for more details on CORS, CSRF attacks, and Apollo Router’s CSRF prevention feature.

This feature is fully effective against attacks carried out against users of spec-compliant browsers. Unfortunately, a major browser introduced a bug in 2025 which meant in certain cases, it failed to follow the CORS spec. The browser’s maintainers have already committed to fixing the bug and making the browser spec-compliant again.

Even with this bug, Apollo Router’s CSRF prevention feature blocks “side effect” CSRF attacks: Apollo Router will still correctly refuse to execute mutations in requests that were not preflighted. However, some specially crafted authenticated GraphQL queries can be issued across origins without preflight in buggy versions of this browser, allowing for XS-Search attacks: an attacker can analyze response times to learn facts about the responses to requests such as whether fields return null or approximately how many list entries are returned from fields.

Apollo Router installations are only vulnerable if they rely on cookies (or HTTP Basic Auth) for authentication.

References

  • github.com/advisories/GHSA-hff2-gcpx-8f4p
  • github.com/apollographql/apollo-server/security/advisories/GHSA-9q82-xgwf-vj6h
  • github.com/apollographql/router
  • github.com/apollographql/router/commit/a72e759bcdeef93fcd3dc928cf3c1f4bbebdcc65
  • github.com/apollographql/router/releases/tag/v2.12.1
  • github.com/apollographql/router/security/advisories/GHSA-hff2-gcpx-8f4p
  • www.apollographql.com/docs/graphos/resources/runtime-release-lifecycle

Code Behaviors & Features

Detect and mitigate GHSA-hff2-gcpx-8f4p with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.61.13, all versions starting from 2.0.0 before 2.10.2, all versions starting from 2.11.0 before 2.12.1

Fixed versions

  • 2.12.1
  • 2.10.2
  • 1.61.13

Solution

Upgrade to versions 1.61.13, 2.10.2, 2.12.1 or above.

Impact 4 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

cargo/apollo-router/GHSA-hff2-gcpx-8f4p.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:03 +0000.