Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1173: Denial of Service in birkir prime

0
Medium
VulnerabilityCVE-2026-1173cvecve-2026-1173
Published: Mon Jan 19 2026 (01/19/2026, 19:32:06 UTC)
Source: CVE Database V5
Vendor/Project: birkir
Product: prime

Description

A vulnerability was found in birkir prime up to 0.4.0.beta.0. The impacted element is an unknown function of the file /graphql of the component GraphQL Array Based Query Batch Handler. The manipulation results in denial of service. The attack can be executed remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:18:18 UTC

Technical Analysis

CVE-2026-1173 identifies a denial of service vulnerability in the birkir prime software, specifically affecting versions up to 0.4.0.beta.0. The vulnerability resides in an unknown function within the /graphql endpoint, which handles GraphQL Array Based Query Batch requests. This component processes batched GraphQL queries, and improper handling or validation of these requests can be exploited by an attacker to overwhelm or crash the service, resulting in denial of service. The attack vector is network-based and requires no authentication or user interaction, making it accessible to any remote attacker. The vulnerability was responsibly disclosed to the birkir project but remains unpatched. The public availability of exploit details increases the risk of exploitation. The CVSS 4.0 vector indicates low attack complexity and no privileges or user interaction needed, with a medium impact primarily on availability. Since the exact function and technical root cause are unspecified, it is likely related to resource exhaustion or improper input validation in the batch query handler. This vulnerability highlights risks inherent in GraphQL implementations that batch queries without sufficient safeguards against malformed or excessive requests.

Potential Impact

The primary impact of CVE-2026-1173 is denial of service, which can disrupt availability of services relying on birkir prime up to version 0.4.0.beta.0. Organizations using this software for GraphQL API handling may experience service outages or degraded performance if targeted by an attacker exploiting this flaw. This can affect business continuity, user experience, and potentially lead to loss of revenue or trust. Since the attack requires no authentication and can be executed remotely, the attack surface is broad. The lack of vendor response and patch increases exposure duration. While confidentiality and integrity are not directly impacted, the availability disruption can have cascading effects on dependent systems and services. Critical infrastructure or high-availability environments using birkir prime may face operational risks. The public disclosure of exploit details may lead to opportunistic attacks, especially in environments with internet-facing GraphQL endpoints.

Mitigation Recommendations

1. Immediately restrict access to the /graphql endpoint by implementing network-level controls such as IP whitelisting or firewall rules to limit exposure to trusted sources only. 2. Deploy rate limiting and request throttling on GraphQL batch queries to prevent resource exhaustion from excessive or malformed requests. 3. Monitor logs and traffic patterns for unusual spikes or malformed batch query requests targeting the /graphql endpoint. 4. If feasible, disable batch query handling temporarily until a patch or update is available. 5. Engage with the birkir project or community to track progress on a patch or updated version addressing this vulnerability. 6. Consider implementing Web Application Firewall (WAF) rules tailored to detect and block suspicious GraphQL batch query patterns. 7. For critical environments, evaluate alternative GraphQL implementations or versions not affected by this vulnerability. 8. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service incidents. These steps go beyond generic advice by focusing on access control, traffic shaping, and proactive monitoring specific to the GraphQL batch query context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-19T07:15:39.300Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e8b204623b1157cb6228f

Added to database: 1/19/2026, 7:50:56 PM

Last enriched: 2/23/2026, 10:18:18 PM

Last updated: 3/24/2026, 12:58:39 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses