Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64173: CWE-288: Authentication Bypass Using an Alternate Path or Channel in apollographql router

0
High
VulnerabilityCVE-2025-64173cvecve-2025-64173cwe-288
Published: Thu Nov 06 2025 (11/06/2025, 20:42:51 UTC)
Source: CVE Database V5
Vendor/Project: apollographql
Product: router

Description

Apollo Router Core is a configurable graph router written in Rust to run a federated supergraph using Apollo Federation 2. In versions 1.61.11 below, as well as 2.0.0-alpha.0 through 2.8.1-rc.0, a vulnerability allowed for unauthenticated queries to access data that required additional access controls. Router incorrectly handled access control directives on interface types/fields and their implementing object types/fields, applying them to interface types/fields while ignoring directives on their implementing object types/fields when all implementations had the same requirements. Apollo Router customers defining @authenticated, @requiresScopes, or @policy directives inconsistently on polymorphic types (i.e., object types that implement interface types) are impacted. This issue is fixed in versions 1.61.12 and 2.8.1.

AI-Powered Analysis

AILast updated: 11/06/2025, 21:13:47 UTC

Technical Analysis

CVE-2025-64173 is an authentication bypass vulnerability classified under CWE-288 that affects Apollo Router Core, a configurable graph router written in Rust for federated supergraphs using Apollo Federation 2. The vulnerability exists in versions prior to 1.61.12 and from 2.0.0-alpha.0 through 2.8.1-rc.0, where the router incorrectly applies access control directives such as @authenticated, @requiresScopes, or @policy on polymorphic GraphQL types. Specifically, when access control directives are inconsistently defined between interface types/fields and their implementing object types/fields, the router enforces the directives only on the interface types/fields and ignores those on the implementing object types/fields. This misapplication allows unauthenticated queries to bypass intended access controls and retrieve sensitive data that should be protected. The vulnerability does not require any privileges or user interaction to exploit, making it remotely exploitable over the network. The flaw impacts confidentiality but not integrity or availability. The issue is resolved in Apollo Router versions 1.61.12 and 2.8.1. No public exploits have been reported to date, but the vulnerability presents a significant risk for organizations relying on Apollo Router for GraphQL federation with complex polymorphic schemas and access control policies.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure, particularly for those using Apollo Router in environments handling sensitive or regulated data such as personal information, financial records, or intellectual property. The bypass of authentication controls can lead to breaches of GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Organizations in sectors like finance, healthcare, telecommunications, and government are especially vulnerable due to the critical nature of their data and services. Since the vulnerability allows unauthenticated remote access to protected data, attackers could exploit it to gather intelligence, conduct espionage, or facilitate further attacks. The lack of impact on integrity and availability reduces the risk of data tampering or service disruption but does not diminish the severity of confidentiality breaches. The absence of known exploits provides a window for proactive mitigation, but the ease of exploitation and high confidentiality impact make timely patching imperative.

Mitigation Recommendations

European organizations should immediately upgrade Apollo Router to version 1.61.12 or later, or 2.8.1 or later, to remediate this vulnerability. Additionally, they should conduct a thorough audit of their GraphQL schemas to ensure consistent application of access control directives (@authenticated, @requiresScopes, @policy) across interface types and their implementing object types. Implement automated schema validation tools to detect inconsistencies in access control directives. Employ runtime monitoring and logging of GraphQL queries to detect anomalous access patterns indicative of exploitation attempts. Restrict network access to Apollo Router instances using network segmentation and firewall rules to limit exposure. Consider implementing additional application-layer access controls or API gateways that enforce authorization independently of Apollo Router. Finally, maintain an incident response plan tailored to data breach scenarios involving GraphQL APIs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.439Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d0c0d08e329e0f8ef65cb

Added to database: 11/6/2025, 8:58:53 PM

Last enriched: 11/6/2025, 9:13:47 PM

Last updated: 11/8/2025, 2:13:47 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats