CVE-2026-1170: Information Disclosure in birkir prime
A vulnerability was detected in birkir prime up to 0.4.0.beta.0. This issue affects some unknown processing of the file /graphql of the component GraphQL API. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-1170 is a medium-severity information disclosure vulnerability identified in birkir prime, an open-source or commercial software product, affecting versions up to 0.4.0.beta.0. The vulnerability resides in the processing logic of the /graphql endpoint of the GraphQL API component. An attacker can remotely send crafted requests to this endpoint without requiring authentication or user interaction, triggering unintended information disclosure. The exact nature of the leaked data is unspecified but could include sensitive internal application data or user information accessible via the API. The vulnerability is exploitable over the network with low attack complexity and no privileges required, increasing the risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) confirms that the attack is network-based, requires no authentication, and results in low-impact confidentiality loss. The vendor was informed early but has not yet released a patch or mitigation guidance. The exploit code is publicly available, which could facilitate exploitation by threat actors. Organizations using birkir prime should consider this vulnerability a significant risk to confidentiality and take immediate protective measures.
Potential Impact
For European organizations, the primary impact of CVE-2026-1170 is unauthorized disclosure of potentially sensitive data through the GraphQL API. This could lead to exposure of internal system details, user data, or business-critical information, which may facilitate further attacks such as social engineering, privilege escalation, or targeted intrusion. Industries handling sensitive personal data (e.g., finance, healthcare, government) are particularly vulnerable to reputational damage and regulatory penalties under GDPR if such data is leaked. The vulnerability's remote and unauthenticated nature increases the attack surface, especially for organizations exposing the /graphql endpoint to the internet without adequate access controls. Although no active exploitation is currently reported, the public availability of exploit code raises the risk of opportunistic attacks. The lack of vendor response and patch availability prolongs exposure, necessitating immediate compensating controls. Overall, the vulnerability threatens confidentiality and could indirectly impact integrity and availability if leveraged as part of a broader attack chain.
Mitigation Recommendations
1. Immediately restrict external access to the /graphql endpoint by implementing network-level controls such as firewalls, VPNs, or IP whitelisting to limit exposure to trusted users only. 2. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious or malformed GraphQL queries that could trigger the vulnerability. 3. Conduct thorough logging and monitoring of GraphQL API requests to identify anomalous patterns indicative of exploitation attempts. 4. If possible, disable or limit the use of the vulnerable GraphQL API until a vendor patch is available. 5. Review and minimize the data exposed via the GraphQL API schema to reduce the impact of any potential disclosure. 6. Engage with the vendor or community to track patch releases or security advisories and apply updates promptly once available. 7. Perform internal security assessments and penetration tests focusing on the GraphQL API to identify and remediate related weaknesses. 8. Educate development and operations teams about secure GraphQL API practices and the risks associated with exposing sensitive data. These steps go beyond generic advice by focusing on immediate access restrictions, active monitoring, and schema hardening tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2026-1170: Information Disclosure in birkir prime
Description
A vulnerability was detected in birkir prime up to 0.4.0.beta.0. This issue affects some unknown processing of the file /graphql of the component GraphQL API. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Technical Analysis
CVE-2026-1170 is a medium-severity information disclosure vulnerability identified in birkir prime, an open-source or commercial software product, affecting versions up to 0.4.0.beta.0. The vulnerability resides in the processing logic of the /graphql endpoint of the GraphQL API component. An attacker can remotely send crafted requests to this endpoint without requiring authentication or user interaction, triggering unintended information disclosure. The exact nature of the leaked data is unspecified but could include sensitive internal application data or user information accessible via the API. The vulnerability is exploitable over the network with low attack complexity and no privileges required, increasing the risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) confirms that the attack is network-based, requires no authentication, and results in low-impact confidentiality loss. The vendor was informed early but has not yet released a patch or mitigation guidance. The exploit code is publicly available, which could facilitate exploitation by threat actors. Organizations using birkir prime should consider this vulnerability a significant risk to confidentiality and take immediate protective measures.
Potential Impact
For European organizations, the primary impact of CVE-2026-1170 is unauthorized disclosure of potentially sensitive data through the GraphQL API. This could lead to exposure of internal system details, user data, or business-critical information, which may facilitate further attacks such as social engineering, privilege escalation, or targeted intrusion. Industries handling sensitive personal data (e.g., finance, healthcare, government) are particularly vulnerable to reputational damage and regulatory penalties under GDPR if such data is leaked. The vulnerability's remote and unauthenticated nature increases the attack surface, especially for organizations exposing the /graphql endpoint to the internet without adequate access controls. Although no active exploitation is currently reported, the public availability of exploit code raises the risk of opportunistic attacks. The lack of vendor response and patch availability prolongs exposure, necessitating immediate compensating controls. Overall, the vulnerability threatens confidentiality and could indirectly impact integrity and availability if leveraged as part of a broader attack chain.
Mitigation Recommendations
1. Immediately restrict external access to the /graphql endpoint by implementing network-level controls such as firewalls, VPNs, or IP whitelisting to limit exposure to trusted users only. 2. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious or malformed GraphQL queries that could trigger the vulnerability. 3. Conduct thorough logging and monitoring of GraphQL API requests to identify anomalous patterns indicative of exploitation attempts. 4. If possible, disable or limit the use of the vulnerable GraphQL API until a vendor patch is available. 5. Review and minimize the data exposed via the GraphQL API schema to reduce the impact of any potential disclosure. 6. Engage with the vendor or community to track patch releases or security advisories and apply updates promptly once available. 7. Perform internal security assessments and penetration tests focusing on the GraphQL API to identify and remediate related weaknesses. 8. Educate development and operations teams about secure GraphQL API practices and the risks associated with exposing sensitive data. These steps go beyond generic advice by focusing on immediate access restrictions, active monitoring, and schema hardening tailored to this specific vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-19T07:15:30.901Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e73e1d302b072d9cff09f
Added to database: 1/19/2026, 6:11:45 PM
Last enriched: 1/26/2026, 7:47:42 PM
Last updated: 2/5/2026, 2:05:58 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
HighCVE-2025-13379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Aspera Console
HighVS Code Configs Expose GitHub Codespaces to Attacks
MediumItaly Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.