Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64173: CWE-288: Authentication Bypass Using an Alternate Path or Channel in apollographql router

0
High
VulnerabilityCVE-2025-64173cvecve-2025-64173cwe-288
Published: Thu Nov 06 2025 (11/06/2025, 20:42:51 UTC)
Source: CVE Database V5
Vendor/Project: apollographql
Product: router

Description

Apollo Router Core is a configurable graph router written in Rust to run a federated supergraph using Apollo Federation 2. In versions 1.61.11 below, as well as 2.0.0-alpha.0 through 2.8.1-rc.0, a vulnerability allowed for unauthenticated queries to access data that required additional access controls. Router incorrectly handled access control directives on interface types/fields and their implementing object types/fields, applying them to interface types/fields while ignoring directives on their implementing object types/fields when all implementations had the same requirements. Apollo Router customers defining @authenticated, @requiresScopes, or @policy directives inconsistently on polymorphic types (i.e., object types that implement interface types) are impacted. This issue is fixed in versions 1.61.12 and 2.8.1.

AI-Powered Analysis

AILast updated: 11/13/2025, 21:17:09 UTC

Technical Analysis

CVE-2025-64173 is an authentication bypass vulnerability identified in Apollo Router Core, a configurable graph router written in Rust that facilitates federated supergraphs using Apollo Federation 2. The vulnerability exists in versions prior to 1.61.12 and from 2.0.0-alpha.0 up to but not including 2.8.1. It stems from the router's incorrect handling of access control directives (@authenticated, @requiresScopes, @policy) on polymorphic GraphQL types—specifically, interface types and their implementing object types. When all implementations of an interface have the same access requirements, the router applies access control directives only to the interface types/fields and ignores those on the implementing object types/fields. This inconsistency allows unauthenticated queries to bypass intended access controls and retrieve sensitive data. The flaw is classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel). Exploitation requires no privileges or user interaction, making it a network-exploitable vulnerability with a CVSS v3.1 score of 7.5 (high severity). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to confidentiality as unauthorized data access can occur. The issue is resolved in Apollo Router versions 1.61.12 and 2.8.1. Organizations using Apollo Router with federated GraphQL schemas that define access control directives inconsistently on polymorphic types should consider themselves vulnerable until patched.

Potential Impact

For European organizations, the impact of CVE-2025-64173 is primarily the unauthorized disclosure of sensitive data due to authentication bypass. Enterprises relying on Apollo Router for federated GraphQL APIs—common in modern microservices and cloud-native architectures—may inadvertently expose protected data fields if their schema directives are inconsistently applied. This can lead to data breaches, regulatory non-compliance (notably GDPR), reputational damage, and potential financial penalties. The vulnerability does not affect data integrity or availability but compromises confidentiality, which is critical for sectors handling personal or sensitive information such as finance, healthcare, and government. Given the ease of exploitation without authentication or user interaction, attackers can remotely query vulnerable routers to extract data. The lack of known exploits in the wild suggests a window for proactive remediation. However, the widespread adoption of Apollo Federation and GraphQL in European tech ecosystems means the risk is non-trivial, especially for organizations with complex polymorphic GraphQL schemas and inconsistent access control implementations.

Mitigation Recommendations

To mitigate CVE-2025-64173, European organizations should immediately upgrade Apollo Router to version 1.61.12 or later, or 2.8.1 or later, where the vulnerability is patched. Beyond patching, organizations must audit their GraphQL schema definitions to ensure consistent application of access control directives (@authenticated, @requiresScopes, @policy) across interface types and all their implementing object types. This includes reviewing polymorphic types to confirm that access controls are not solely applied at the interface level but also correctly enforced on each implementation. Implement automated schema validation tools to detect inconsistent directive usage. Additionally, employ runtime monitoring and logging of GraphQL queries to detect anomalous access patterns that may indicate exploitation attempts. Network-level protections such as Web Application Firewalls (WAFs) can be tuned to detect and block suspicious GraphQL queries. Finally, conduct security awareness training for developers on secure GraphQL schema design and access control best practices to prevent similar issues in future deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-28T21:07:16.439Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690d0c0d08e329e0f8ef65cb

Added to database: 11/6/2025, 8:58:53 PM

Last enriched: 11/13/2025, 9:17:09 PM

Last updated: 12/22/2025, 1:38:10 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats