Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32621: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in @apollo federation-internals

0
Critical
VulnerabilityCVE-2026-32621cvecve-2026-32621cwe-1321
Published: Fri Mar 13 2026 (03/13/2026, 20:29:54 UTC)
Source: CVE Database V5
Vendor/Project: @apollo
Product: federation-internals

Description

CVE-2026-32621 is a critical prototype pollution vulnerability in Apollo Federation's federation-internals package affecting versions prior to 2. 9. 6, 2. 10. 5, 2. 11. 6, 2. 12. 3, and 2. 13.

AI-Powered Analysis

AILast updated: 03/13/2026, 20:59:04 UTC

Technical Analysis

Apollo Federation is a framework designed to compose multiple GraphQL APIs into a single unified graph. The vulnerability identified as CVE-2026-32621 is a prototype pollution issue classified under CWE-1321, which occurs in the federation-internals package of Apollo Federation. Specifically, the flaw exists in the query plan execution logic within the gateway component. Attackers can exploit this by crafting GraphQL operations that use field aliases or variable names matching prototype-inheritable properties, or by injecting malicious JSON response payloads from a compromised subgraph. This manipulation allows pollution of the JavaScript Object.prototype, a critical prototype chain that all objects inherit from. Prototype pollution can lead to arbitrary code execution, data corruption, or denial of service by altering fundamental object behaviors. The vulnerability affects multiple versions prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, spanning several release lines. The CVSS v3.1 score is 9.9 (critical), reflecting network attack vector, low complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and low impact on availability. Although no active exploits are reported, the severity and ease of exploitation make this a high-priority issue for organizations relying on Apollo Federation for API composition.

Potential Impact

The impact of this vulnerability is significant for organizations using Apollo Federation to unify multiple GraphQL APIs. Successful exploitation can allow attackers to manipulate the Object.prototype in the gateway, potentially leading to privilege escalation, unauthorized data access, data tampering, or denial of service. This compromises the confidentiality and integrity of API responses and may disrupt the availability of the unified graph service. Since the gateway is a central component aggregating multiple subgraphs, a successful attack could cascade, affecting multiple backend services and clients relying on the API. The ability for a malicious client or compromised subgraph to exploit this vulnerability increases the attack surface, especially in environments where subgraphs are managed by different teams or third parties. This could undermine trust in the API infrastructure and lead to data breaches or service outages.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Apollo Federation's federation-internals package to versions 2.9.6, 2.10.5, 2.11.6, 2.12.3, or 2.13.2 or later, where the issue is fixed. Additionally, implement strict input validation and sanitization on all GraphQL operations, especially those involving field aliases and variable names, to prevent injection of prototype-inheritable property names. Limit the privileges of clients interacting with the gateway to reduce the risk of exploitation. Monitor and audit subgraph responses for anomalous JSON payloads that could indicate attempts to pollute Object.prototype. Employ runtime application self-protection (RASP) or Web Application Firewalls (WAF) with custom rules to detect and block suspicious GraphQL queries targeting prototype properties. Finally, enforce strict security controls and code reviews on subgraph development to prevent compromise and malicious payload injection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T15:29:36.557Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b477402f860ef943af037e

Added to database: 3/13/2026, 8:44:48 PM

Last enriched: 3/13/2026, 8:59:04 PM

Last updated: 3/13/2026, 11:07:59 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses