Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @apollo/sandbox
  4. ›
  5. GHSA-w87v-7w53-wwxv

GHSA-w87v-7w53-wwxv: Apollo Embedded Sandbox and Explorer vulnerable to CSRF via window.postMessage origin-validation bypass

September 26, 2025

A Cross-Site Request Forgery (CSRF) vulnerability was identified in Apollo’s Embedded Sandbox and Embedded Explorer.

The vulnerability arises from missing origin validation in the client-side code that handles window.postMessage events. A malicious website can send forged messages to the embedding page, causing the victim’s browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim’s cookies.

References

  • github.com/advisories/GHSA-w87v-7w53-wwxv
  • github.com/apollographql/embeddable-explorer
  • github.com/apollographql/embeddable-explorer/security/advisories/GHSA-w87v-7w53-wwxv

Code Behaviors & Features

Detect and mitigate GHSA-w87v-7w53-wwxv with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.7.2

Fixed versions

  • 2.7.2

Solution

Upgrade to version 2.7.2 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-346: Origin Validation Error
  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

npm/@apollo/sandbox/GHSA-w87v-7w53-wwxv.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 06 Oct 2025 00:19:32 +0000.