Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1175: Information Exposure Through Error Message in birkir prime

0
Medium
VulnerabilityCVE-2026-1175cvecve-2026-1175
Published: Mon Jan 19 2026 (01/19/2026, 20:32:08 UTC)
Source: CVE Database V5
Vendor/Project: birkir
Product: prime

Description

CVE-2026-1175 is a medium severity vulnerability affecting birkir prime up to version 0. 4. 0. beta. 0. It involves information exposure through error messages in the GraphQL Directive Handler component, specifically via the /graphql endpoint. The vulnerability can be exploited remotely without authentication or user interaction, potentially allowing attackers to glean sensitive internal information. Although the exploit is publicly available, there are no confirmed reports of active exploitation in the wild. The vendor has been notified but has not yet issued a patch. European organizations using birkir prime, especially those relying on the affected version, should prioritize mitigation to prevent information leakage that could facilitate further attacks.

AI-Powered Analysis

AILast updated: 01/19/2026, 21:05:35 UTC

Technical Analysis

CVE-2026-1175 is an information exposure vulnerability identified in birkir prime versions up to 0.4.0.beta.0. The flaw resides in an unspecified function within the GraphQL Directive Handler component, accessed through the /graphql endpoint. When exploited, this vulnerability causes the system to leak sensitive information via error messages returned to the client. Since the vulnerability is remotely exploitable without requiring authentication or user interaction, an attacker can send crafted GraphQL queries to trigger error conditions that reveal internal system details such as configuration data, software versions, or other sensitive metadata. This information leakage can aid attackers in crafting more targeted and effective subsequent attacks. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting a medium severity level due to its ease of exploitation and the confidentiality impact, while not affecting integrity or availability. The exploit code is publicly available, increasing the risk of opportunistic attacks. The vendor was informed early but has not responded or released a patch, leaving systems vulnerable. No known active exploitation has been reported yet. The vulnerability's presence in a GraphQL API endpoint is notable because GraphQL is increasingly used in modern web applications, potentially broadening the attack surface.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information leakage that could compromise confidentiality. Exposure of internal system details can facilitate reconnaissance by attackers, enabling them to identify further vulnerabilities or misconfigurations. This can lead to more severe attacks such as privilege escalation, data breaches, or service disruption. Organizations in sectors with high reliance on web applications using GraphQL, such as finance, healthcare, and technology, may face increased risk. The lack of authentication requirements and remote exploitability means attackers can attempt exploitation from anywhere, increasing the threat landscape. While the vulnerability does not directly impact system integrity or availability, the information exposure can be a critical stepping stone in multi-stage attacks. European companies using birkir prime 0.4.0.beta.0 or earlier versions should be particularly vigilant. The absence of a vendor patch increases exposure time, raising the likelihood of exploitation attempts.

Mitigation Recommendations

Organizations should immediately audit their use of birkir prime and identify any instances running version 0.4.0.beta.0 or earlier. Since no official patch is available, temporary mitigations include implementing strict input validation and error handling to prevent detailed error messages from being returned to clients. Web application firewalls (WAFs) can be configured to detect and block suspicious GraphQL queries targeting the /graphql endpoint. Network-level restrictions should limit access to the GraphQL API to trusted sources where possible. Monitoring and logging of GraphQL endpoint traffic should be enhanced to detect anomalous query patterns indicative of exploitation attempts. Organizations should engage with the birkir project or community to track patch releases and apply updates promptly once available. Additionally, consider deploying runtime application self-protection (RASP) tools to detect and block exploitation attempts in real time. Security teams should conduct penetration testing focused on GraphQL endpoints to identify similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-19T07:15:44.976Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e99304623b1157cce4b13

Added to database: 1/19/2026, 8:50:56 PM

Last enriched: 1/19/2026, 9:05:35 PM

Last updated: 1/19/2026, 11:02:52 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats