Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40094: n/a

0
Medium
VulnerabilityCVE-2024-40094cvecve-2024-40094
Published: Tue Jul 30 2024 (07/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

GraphQL Java (aka graphql-java) before 21.5 does not properly consider ExecutableNormalizedFields (ENFs) as part of preventing denial of service via introspection queries. 20.9 and 19.11 are also fixed versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 06:36:35 UTC

Technical Analysis

CVE-2024-40094 is a vulnerability identified in graphql-java, a widely used Java implementation of the GraphQL query language. The issue arises because graphql-java versions before 21.5 do not properly consider ExecutableNormalizedFields (ENFs) when processing introspection queries. Introspection queries allow clients to query the schema itself, which is useful for development and tooling but can be abused if not properly controlled. The improper handling of ENFs means that attackers can craft introspection queries that bypass existing protections designed to prevent denial of service (DoS) attacks. Specifically, the vulnerability allows attackers to submit specially crafted introspection queries that can exhaust server resources, leading to degraded performance or service outages. The flaw affects versions prior to 21.5, with fixed versions including 20.9 and 19.11. The CVSS score of 5.3 (medium) reflects that the vulnerability is remotely exploitable without authentication or user interaction, but it impacts only integrity (by disrupting normal query processing) and not confidentiality or availability directly. No known exploits have been reported in the wild yet, but the potential for DoS makes this a significant concern for organizations relying on graphql-java for their API infrastructure.

Potential Impact

The primary impact of CVE-2024-40094 is the potential for denial of service attacks against systems running vulnerable versions of graphql-java. Attackers can exploit this flaw remotely without authentication, allowing them to disrupt API services by sending crafted introspection queries that consume excessive server resources. This can lead to degraded performance, increased latency, or complete service outages, affecting the availability and integrity of the affected applications. Organizations relying on graphql-java for critical API endpoints may experience operational disruptions, customer dissatisfaction, and potential financial losses due to downtime. While the vulnerability does not expose sensitive data directly, the resulting service interruptions can indirectly impact business continuity and trust. The medium severity rating indicates that while the threat is serious, it is not as critical as vulnerabilities that allow remote code execution or data breaches. However, the ease of exploitation and the widespread use of graphql-java in modern web applications elevate the risk profile.

Mitigation Recommendations

To mitigate CVE-2024-40094, organizations should immediately upgrade graphql-java to one of the fixed versions: 21.5, 20.9, or 19.11. Applying these patches ensures that ExecutableNormalizedFields are properly handled, preventing abuse via introspection queries. Beyond patching, implement strict rate limiting on GraphQL endpoints to reduce the impact of potential abuse. Employ query complexity analysis and depth limiting to restrict overly complex or deeply nested queries that could strain server resources. Monitor API traffic for unusual patterns indicative of abuse, such as repeated introspection queries or spikes in query volume. Consider disabling introspection queries in production environments if not required, or restrict them to authenticated and authorized users only. Regularly review and update dependency management processes to ensure timely application of security patches. Finally, incorporate these mitigations into incident response plans to quickly detect and respond to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ca6b7ef31ef0b567289

Added to database: 2/25/2026, 9:41:58 PM

Last enriched: 2/26/2026, 6:36:35 AM

Last updated: 4/12/2026, 8:35:24 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses