CVE-2025-64347: CWE-284: Improper Access Control in apollographql router
Apollo Router Core is a configurable Rust graph router written to run a federated supergraph using Apollo Federation 2. Versions 1.61.12-rc.0 and below and 2.8.1-rc.0 allow unauthorized access to protected data through schema elements with access control directives (@authenticated, @requiresScopes, and @policy) that were renamed via @link imports. Router did not enforce renamed access control directives on schema elements (e.g. fields and types), allowing queries to bypass those element-level access controls. This issue is fixed in versions 1.61.12 and 2.8.1.
AI Analysis
Technical Summary
CVE-2025-64347 is an improper access control vulnerability (CWE-284) found in Apollo Router Core, a Rust-based router designed to manage federated supergraphs using Apollo Federation 2. The vulnerability arises from the router's failure to enforce access control directives on schema elements that have been renamed via the GraphQL @link import feature. Specifically, directives such as @authenticated, @requiresScopes, and @policy, which are intended to restrict access to certain fields or types, can be renamed in imported schemas. The router did not correctly apply these renamed directives, allowing queries to bypass element-level access controls. This means that unauthorized users can query protected data without authentication or proper authorization. The affected versions include all releases prior to 1.61.12 and versions from 2.8.1-rc.0 up to but not including 2.8.1. The issue was addressed in versions 1.61.12 and 2.8.1. The CVSS v3.1 score is 7.5 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact. No known exploits are currently reported in the wild. The vulnerability is critical for organizations relying on Apollo Router for enforcing fine-grained access control in their GraphQL federated services, as it undermines the integrity of access policies and exposes sensitive data.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure, especially for those leveraging Apollo Router in their GraphQL federated architectures. Sensitive business, customer, or operational data protected by access control directives could be exposed to unauthorized parties, potentially leading to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial penalties. Since the vulnerability allows remote exploitation without authentication or user interaction, attackers can easily exploit it over the network, increasing the threat surface. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often use GraphQL APIs for complex data aggregation, are particularly vulnerable. The failure to enforce renamed access control directives could also undermine trust in API security and complicate incident response efforts.
Mitigation Recommendations
The primary mitigation is to upgrade Apollo Router to versions 1.61.12 or later, or 2.8.1 or later, where the vulnerability is fixed. Organizations should audit their GraphQL schemas to identify any use of @link imports that rename access control directives and verify that access policies are correctly applied. Implement strict schema validation and testing to detect any bypasses of access control rules. Employ runtime monitoring and anomaly detection on GraphQL queries to identify unusual access patterns that may indicate exploitation attempts. Limit network exposure of Apollo Router instances by restricting access to trusted networks or via VPNs. Additionally, enforce strong authentication and authorization at other layers to provide defense-in-depth. Maintain up-to-date inventories of Apollo Router deployments and ensure patch management processes prioritize this vulnerability due to its high severity and ease of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Ireland
CVE-2025-64347: CWE-284: Improper Access Control in apollographql router
Description
Apollo Router Core is a configurable Rust graph router written to run a federated supergraph using Apollo Federation 2. Versions 1.61.12-rc.0 and below and 2.8.1-rc.0 allow unauthorized access to protected data through schema elements with access control directives (@authenticated, @requiresScopes, and @policy) that were renamed via @link imports. Router did not enforce renamed access control directives on schema elements (e.g. fields and types), allowing queries to bypass those element-level access controls. This issue is fixed in versions 1.61.12 and 2.8.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-64347 is an improper access control vulnerability (CWE-284) found in Apollo Router Core, a Rust-based router designed to manage federated supergraphs using Apollo Federation 2. The vulnerability arises from the router's failure to enforce access control directives on schema elements that have been renamed via the GraphQL @link import feature. Specifically, directives such as @authenticated, @requiresScopes, and @policy, which are intended to restrict access to certain fields or types, can be renamed in imported schemas. The router did not correctly apply these renamed directives, allowing queries to bypass element-level access controls. This means that unauthorized users can query protected data without authentication or proper authorization. The affected versions include all releases prior to 1.61.12 and versions from 2.8.1-rc.0 up to but not including 2.8.1. The issue was addressed in versions 1.61.12 and 2.8.1. The CVSS v3.1 score is 7.5 (high), reflecting the vulnerability's network attack vector, low attack complexity, no privileges required, no user interaction, and high confidentiality impact. No known exploits are currently reported in the wild. The vulnerability is critical for organizations relying on Apollo Router for enforcing fine-grained access control in their GraphQL federated services, as it undermines the integrity of access policies and exposes sensitive data.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized data disclosure, especially for those leveraging Apollo Router in their GraphQL federated architectures. Sensitive business, customer, or operational data protected by access control directives could be exposed to unauthorized parties, potentially leading to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial penalties. Since the vulnerability allows remote exploitation without authentication or user interaction, attackers can easily exploit it over the network, increasing the threat surface. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often use GraphQL APIs for complex data aggregation, are particularly vulnerable. The failure to enforce renamed access control directives could also undermine trust in API security and complicate incident response efforts.
Mitigation Recommendations
The primary mitigation is to upgrade Apollo Router to versions 1.61.12 or later, or 2.8.1 or later, where the vulnerability is fixed. Organizations should audit their GraphQL schemas to identify any use of @link imports that rename access control directives and verify that access policies are correctly applied. Implement strict schema validation and testing to detect any bypasses of access control rules. Employ runtime monitoring and anomaly detection on GraphQL queries to identify unusual access patterns that may indicate exploitation attempts. Limit network exposure of Apollo Router instances by restricting access to trusted networks or via VPNs. Additionally, enforce strong authentication and authorization at other layers to provide defense-in-depth. Maintain up-to-date inventories of Apollo Router deployments and ensure patch management processes prioritize this vulnerability due to its high severity and ease of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-30T17:40:52.031Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690e3201f29beb96f88aff9c
Added to database: 11/7/2025, 5:53:05 PM
Last enriched: 11/14/2025, 6:15:36 PM
Last updated: 1/7/2026, 8:45:29 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.