Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. apollo-server-core
  4. ›
  5. GHSA-9q82-xgwf-vj6h

GHSA-9q82-xgwf-vj6h: Apollo Server: Browser bug allows for bypass of XS-Search (read-only Cross-Site Request Forgery) prevention

March 26, 2026

In a Cross-Site Request Forgery attack, untrusted web content causes browsers to send authenticated requests to web servers which use cookies for authentication. While the web content is prevented from reading the request’s response due to the Cross-Origin Request Sharing (CORS) protocol, an attacker may be able to cause side effects in the server (“CSRF” attack), or learn something about the response via timing analysis (“XS-Search” attack).

Apollo Server has a built-in feature which prevents CSRF and XS-Search attacks: it refuses to process GraphQL requests that could possibly have been sent by a spec-compliant web browser without a protective “preflight” step. See Apollo Server’s docs for more details on CORS, CSRF attacks, and Apollo Server’s CSRF prevention feature.

This feature is fully effective against attacks carried out against users of spec-compliant browsers. Unfortunately, a major browser introduced a bug in 2025 which meant in certain cases, it failed to follow the CORS spec. The browser’s maintainers have already committed to fixing the bug and making the browser spec-compliant again.

Even with this bug, Apollo Server’s CSRF prevention feature blocks “side effect” CSRF attacks: Apollo Server will still correctly refuse to execute mutations in requests that were not preflighted. However, some specially crafted authenticated GraphQL queries can be issued across origins without preflight in buggy versions of this browser, allowing for XS-Search attacks: an attacker can analyze response times to learn facts about the responses to requests such as whether fields return null or approximately how many list entries are returned from fields.

GraphQL servers are only vulnerable if they rely on cookies (or HTTP Basic Auth) for authentication.

References

  • github.com/advisories/GHSA-9q82-xgwf-vj6h
  • github.com/apollographql/apollo-server
  • github.com/apollographql/apollo-server/commit/ada12001c4e95b5c779d80314a5a32e33087b5cf
  • github.com/apollographql/apollo-server/releases/tag/@apollo/server@5.5.0
  • github.com/apollographql/apollo-server/security/advisories/GHSA-9q82-xgwf-vj6h
  • github.com/apollographql/router/security/advisories/GHSA-hff2-gcpx-8f4p
  • www.apollographql.com/docs/apollo-server/previous-versions

Code Behaviors & Features

Detect and mitigate GHSA-9q82-xgwf-vj6h with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3.13.0

Solution

Unfortunately, there is no solution available yet.

Impact 4 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

npm/apollo-server-core/GHSA-9q82-xgwf-vj6h.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 10 Apr 2026 12:17:29 +0000.