Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1174: Resource Consumption in birkir prime

0
Medium
VulnerabilityCVE-2026-1174cvecve-2026-1174
Published: Mon Jan 19 2026 (01/19/2026, 20:02:05 UTC)
Source: CVE Database V5
Vendor/Project: birkir
Product: prime

Description

A vulnerability was determined in birkir prime up to 0.4.0.beta.0. This affects an unknown function of the file /graphql of the component GraphQL Alias Handler. This manipulation causes resource consumption. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:18:32 UTC

Technical Analysis

CVE-2026-1174 identifies a resource consumption vulnerability in the birkir prime software, specifically versions up to 0.4.0.beta.0. The flaw resides in an unspecified function within the GraphQL Alias Handler component, accessible via the /graphql endpoint. An attacker can remotely exploit this vulnerability without any authentication or user interaction, causing excessive resource consumption on the targeted system. This could manifest as CPU, memory, or other resource exhaustion, potentially leading to denial of service (DoS) conditions. The vulnerability was responsibly disclosed to the birkir project early, but no patch or remediation has been released as of the publication date. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction required, no impact on confidentiality or integrity, but low impact on availability. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation has been reported. The vulnerability affects a niche software product used primarily in environments leveraging GraphQL APIs, which may be part of modern web applications or services.

Potential Impact

The primary impact of CVE-2026-1174 is the potential for denial of service through resource exhaustion, which can disrupt availability of services relying on birkir prime's GraphQL endpoint. This can lead to downtime, degraded performance, and potential loss of business continuity for organizations using affected versions. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modifications are unlikely. However, service unavailability can indirectly affect customer trust and operational efficiency. The ease of remote exploitation without authentication increases the risk, especially for internet-facing deployments. Organizations with critical applications depending on birkir prime may face operational disruptions, increased incident response costs, and reputational damage if exploited. The lack of an official patch or vendor response heightens the urgency for mitigation. Given the public disclosure of exploit details, opportunistic attackers may attempt to leverage this vulnerability to cause outages or as part of larger attack campaigns.

Mitigation Recommendations

1. Immediately restrict access to the /graphql endpoint of birkir prime instances to trusted networks or through VPNs to reduce exposure. 2. Implement rate limiting and request throttling on the GraphQL API to mitigate resource exhaustion attempts. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious GraphQL queries that could trigger resource consumption. 4. Monitor system resource usage and set up alerts for unusual spikes indicative of exploitation attempts. 5. Consider deploying birkir prime behind reverse proxies that can absorb or filter malicious traffic. 6. If feasible, upgrade to a newer version of birkir prime once a patch is released; meanwhile, evaluate alternative GraphQL implementations or temporary workarounds such as disabling the vulnerable GraphQL Alias Handler feature. 7. Conduct regular security assessments and penetration tests focusing on GraphQL endpoints to identify similar vulnerabilities. 8. Maintain incident response readiness to quickly isolate and remediate affected systems if exploitation is detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-19T07:15:42.177Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e92284623b1157ccc1f3c

Added to database: 1/19/2026, 8:20:56 PM

Last enriched: 2/23/2026, 10:18:32 PM

Last updated: 3/26/2026, 9:24:03 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses