TopVuln

High-risk vulnerability digests

CVE-2026-41327

  • CRITICAL

CVE-2026-41327 vulnerabilities

Details

CVSS v3
9.1
NVD published
2026-04-24 19:17:12
EPSS
<0.1% probability · 10.7th percentile — 2026-05-08
Affected versions
cpe:2.3:a:dgraph:dgraph:*:*:*:*:*:go:*:*
Summary
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack is a single HTTP POST to /mutate?commitNow=true containing a crafted cond field in an upsert mutation. The cond value is concatenated directly into a DQL query string via strings.Builder.WriteString after only a cosmetic strings.Replace transformation. No escaping, parameterization, or structural validation is applied. An attacker injects an additional DQL query block into the cond string, which the DQL parser accepts as a syntactically valid named query block. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.
Remediation
Not available in our cache.
Exploit info
https://github.com/dgraph-io/dgraph/security/advisories/GHSA-mrxx-39g5-ph77

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.