TopVuln

High-risk vulnerability digests

CVE-2026-41492

  • CRITICAL

CVE-2026-41492 vulnerabilities

Details

CVSS v3
9.8
NVD published
2026-04-24 19:17:14
EPSS
0.1% probability · 29.7th percentile — 2026-05-08
Affected versions
cpe:2.3:a:dgraph:dgraph:*:*:*:*:*:go:*:*
Summary
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, Dgraphl exposes the process command line through the unauthenticated /debug/vars endpoint on Alpha. Because the admin token is commonly supplied via the --security "token=..." startup flag, an unauthenticated attacker can retrieve that token and replay it in the X-Dgraph-AuthToken header to access admin-only endpoints. This is a variant of the previously fixed /debug/pprof/cmdline issue, but the current fix is incomplete because it blocks only /debug/pprof/cmdline and still serves http.DefaultServeMux, which includes expvar's /debug/vars handler. This vulnerability is fixed in 25.3.3.
Remediation
Not available in our cache.
Exploit info
https://github.com/dgraph-io/dgraph/security/advisories/GHSA-vvf7-6rmr-m29q

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.