CVE-2026-32621 (GCVE-0-2026-32621)

Vulnerability from cvelistv5 – Published: 2026-03-13 20:29 – Updated: 2026-03-16 20:14
VLAI?
Title
Apollo Federation has prototype pollution via incomplete key sanitization
Summary
Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2.
CWE
  • CWE-1321 - Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Assigner
References
Impacted products
Vendor Product Version
@apollo federation-internals Affected: >= 2.13.0-preview.0, < 2.13.2
Affected: >= 2.12.0-preview.0, < 2.12.3
Affected: >= 2.11.0-preview.0, < 2.11.6
Affected: >= 2.10.0-alpha.0, < 2.10.5
Affected: < 2.9.6
Create a notification for this product.
    @apollo gateway Affected: >= 2.13.0-preview.0, < 2.13.2
Affected: >= 2.12.0-preview.0, < 2.12.3
Affected: >= 2.11.0-preview.0, < 2.11.6
Affected: >= 2.10.0-alpha.0, < 2.10.5
Affected: < 2.9.6
Create a notification for this product.
    @apollo query-planner Affected: >= 2.13.0-preview.0, < 2.13.2
Affected: >= 2.12.0-preview.0, < 2.12.3
Affected: >= 2.11.0-preview.0, < 2.11.6
Affected: >= 2.10.0-alpha.0, < 2.10.5
Affected: < 2.9.6
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-32621",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-16T20:14:28.668002Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-16T20:14:57.335Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "federation-internals",
          "vendor": "@apollo",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 2.13.0-preview.0, \u003c 2.13.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.12.0-preview.0, \u003c 2.12.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.11.0-preview.0, \u003c 2.11.6"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.10.0-alpha.0, \u003c 2.10.5"
            },
            {
              "status": "affected",
              "version": "\u003c 2.9.6"
            }
          ]
        },
        {
          "product": "gateway",
          "vendor": "@apollo",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 2.13.0-preview.0, \u003c 2.13.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.12.0-preview.0, \u003c 2.12.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.11.0-preview.0, \u003c 2.11.6"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.10.0-alpha.0, \u003c 2.10.5"
            },
            {
              "status": "affected",
              "version": "\u003c 2.9.6"
            }
          ]
        },
        {
          "product": "query-planner",
          "vendor": "@apollo",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 2.13.0-preview.0, \u003c 2.13.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.12.0-preview.0, \u003c 2.12.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.11.0-preview.0, \u003c 2.11.6"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.10.0-alpha.0, \u003c 2.10.5"
            },
            {
              "status": "affected",
              "version": "\u003c 2.9.6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1321",
              "description": "CWE-1321: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-13T20:29:54.875Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/apollographql/federation/security/advisories/GHSA-pfjj-6f4p-rvmh",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/apollographql/federation/security/advisories/GHSA-pfjj-6f4p-rvmh"
        }
      ],
      "source": {
        "advisory": "GHSA-pfjj-6f4p-rvmh",
        "discovery": "UNKNOWN"
      },
      "title": "Apollo Federation has prototype pollution via incomplete key sanitization"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-32621",
    "datePublished": "2026-03-13T20:29:54.875Z",
    "dateReserved": "2026-03-12T15:29:36.557Z",
    "dateUpdated": "2026-03-16T20:14:57.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-32621",
      "date": "2026-05-06",
      "epss": "0.00037",
      "percentile": "0.10814"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-32621\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-03-16T14:19:39.797\",\"lastModified\":\"2026-04-28T21:13:28.120\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2.\"},{\"lang\":\"es\",\"value\":\"Apollo Federation es una arquitectura para componer declarativamente APIs en un grafo unificado. Antes de 2.9.6, 2.10.5, 2.11.6, 2.12.3 y 2.13.2, existe una vulnerabilidad en la ejecuci\u00f3n del plan de consulta dentro del gateway que puede permitir la contaminaci\u00f3n de Object.prototype en ciertos escenarios. Un cliente malicioso puede ser capaz de contaminar Object.prototype en el gateway directamente elaborando operaciones con alias de campo y/o nombres de variables que apuntan a propiedades heredables del prototipo. Alternativamente, si un subgrafo fuera comprometido por un actor malicioso, podr\u00edan ser capaces de contaminar Object.prototype en el gateway elaborando cargas \u00fatiles de respuesta JSON que apuntan a propiedades heredables del prototipo. Esta vulnerabilidad est\u00e1 corregida en 2.9.6, 2.10.5, 2.11.6, 2.12.3 y 2.13.2.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1321\"}]}],\"references\":[{\"url\":\"https://github.com/apollographql/federation/security/advisories/GHSA-pfjj-6f4p-rvmh\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32621\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-16T20:14:28.668002Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-16T20:14:41.352Z\"}}], \"cna\": {\"title\": \"Apollo Federation has prototype pollution via incomplete key sanitization\", \"source\": {\"advisory\": \"GHSA-pfjj-6f4p-rvmh\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"@apollo\", \"product\": \"federation-internals\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 2.13.0-preview.0, \u003c 2.13.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.12.0-preview.0, \u003c 2.12.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.11.0-preview.0, \u003c 2.11.6\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.10.0-alpha.0, \u003c 2.10.5\"}, {\"status\": \"affected\", \"version\": \"\u003c 2.9.6\"}]}, {\"vendor\": \"@apollo\", \"product\": \"gateway\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 2.13.0-preview.0, \u003c 2.13.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.12.0-preview.0, \u003c 2.12.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.11.0-preview.0, \u003c 2.11.6\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.10.0-alpha.0, \u003c 2.10.5\"}, {\"status\": \"affected\", \"version\": \"\u003c 2.9.6\"}]}, {\"vendor\": \"@apollo\", \"product\": \"query-planner\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 2.13.0-preview.0, \u003c 2.13.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.12.0-preview.0, \u003c 2.12.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.11.0-preview.0, \u003c 2.11.6\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.10.0-alpha.0, \u003c 2.10.5\"}, {\"status\": \"affected\", \"version\": \"\u003c 2.9.6\"}]}], \"references\": [{\"url\": \"https://github.com/apollographql/federation/security/advisories/GHSA-pfjj-6f4p-rvmh\", \"name\": \"https://github.com/apollographql/federation/security/advisories/GHSA-pfjj-6f4p-rvmh\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1321\", \"description\": \"CWE-1321: Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-03-13T20:29:54.875Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-32621\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-16T20:14:57.335Z\", \"dateReserved\": \"2026-03-12T15:29:36.557Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-03-13T20:29:54.875Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…