Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in @apollo/gateway version 2.10.1.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apollographql
Apollographql apollo Gateway |
|
CPEs | cpe:2.3:a:apollographql:apollo_gateway:*:*:*:*:*:node.js:*:* | |
Vendors & Products |
Apollographql
Apollographql apollo Gateway |
Tue, 08 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 07 Apr 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in @apollo/gateway version 2.10.1. | |
Title | Apollo Gateway Query Planner Vulnerable to Excessive Resource Consumption via Named Fragment Expansion | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-07T20:38:59.654Z
Updated: 2025-04-08T18:25:01.371Z
Reserved: 2025-04-01T21:57:32.957Z
Link: CVE-2025-32030

Updated: 2025-04-08T18:18:34.633Z

Status : Analyzed
Published: 2025-04-07T21:15:43.037
Modified: 2025-08-01T16:52:41.117
Link: CVE-2025-32030

No data.